`

port 21

A WordPress login page at 172.16.10.12/wp-login.php

A WordPress user-enumeration vulnerability (CVE-2017-5487)

at 172.16.10.12/wp-json/wp/v2/users

Lets confirm these three findings manually to ensure there are

no false positives. Connect to the identified FTP server at

172.16.10.11 by issuing the following ftp command. This

command will connect to the server using the anonymous user and

an empty password (note that there is nothing specified after the

colon (:):

$ ftp ftp://anonymous:@172.16.10.11

Connected to 172.16.10.11.

220 (vsFTPd 3.0.5)

331 Please specify the password.

230 Login successful.

Remote system type is UNIX.

Using binary mode to transfer files.

200 Switching to Binary mode.

We were able to connect! Let's issue an ls command to verify

that we can list files and directories on the server:

ftp> ls

229 Entering Extended Passive Mode (|||33817|)

150 Here comes the directory listing.

drwxr-xr-x 1 0 0 4096 Mar 11 05:23 backup

-rw-r--r-- 1 0 0 10671 Mar 11 05:22 index.html

226 Directory send OK.

We see an index.html file and a backup folder. This is the same

folder that stores the two git repositories we saw earlier, except now

we have access to the FTP server where these files actually live.

Next, open a browser to http://172.16.10.12/wp-login.php from

your Kali machine. You should see the page in Figure 5-2.

Black Hat Bash (Early Access) © 2023 by Dolev Farhi and Nick Aleks