VulnHub Relevant Walkthrough – More WordPress Exploitation



VulnHub Relevant Walkthrough – More WordPress Exploitation

Original blog post –

Don’t forget to follow my Twitter account for InfoSec/Penetration Testing news and memes –

VulnHub Relevant Walkthrough – Introduction
———————————————————–
If you haven’t read my last walkthrough, then I can recommend it.

This time, it’s Relevant by iamv1nc3nt, which you can download here.

VulnHub Relevant Walkthrough – Conclusion
———————————————————–
This was a fun box and troubleshooting the WordPress exploit was an interesting challenge.

I know that there have been a ton of VulnHub posts recently, but I am still catching up on all my stream highlights.

In the meantime, let me know if there is any other content that you’d like to see, or just come on over and watch/follow/subscribe to the Twitch channel!

———————————————————————————–

💸 Please consider supporting the channel on Patreon if you appreciate what I do!

———————————————————————————–

My streaming, hacking, and recording setup (Amazon Affiliate links):

📷 Logitech C920S Webcam –
🎤 Blue Yeti USB Mic –
⌨ Corsair K65 (I have the Vengeance) –
🖱 Razer DeathAdder Chroma –
📺 Alienware 34″ WQHD monitor –
🔊 Logitech Z263 –
💻 Custom Built PC (video eventually?)

———————————————————————————–

💵 If you’re just looking to buy something off of Fiverr, then use this Fiverr affiliate link so I get that sweet, sweet cut.

💰 Want to become a Fiverr Affiliate yourself and start making that bank? Use my link and hook us both up!

———————————————————————————–

▶ For optimizing your YouTube SEO, you can’t go wrong with TubeBuddy.

———————————————————————————–

Thumbnail Design by Longestsoloever –

Stock images and videos from Pixabay –
SVG Icons from SVG Repo –

———————————————————————————–

Disclaimer: Some of these links are affiliate links where I’ll earn a small commission if you make a purchase at no additional cost to you.

———————————————————————————–

Ray Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s done it all. To show for it, he has obtained an OSCE, OSCP, eCPPT, GXPN, eWPT, eWPTX, SLAE, eMAPT, Security+, ICAgile CP, ITIL v3 Foundation, and even a sabermetrics certification!

———————————————————————————–

This video and any linked blog posts are for educational and informational purposes only. Any time the term “hacking” is used shall be regarded as ethical hacking. Do not attempt to violate the law with anything contained within these materials. If you plan to use this content for illegal purposes, then please leave the channel. We will not be held responsible for any illegal actions performed with the techniques within. Neither the owners of this channel, nor the author(s) of this material, or anyone associated with Doylersec will accept responsibility for your actions. The misuse of the information presented on this channel can result in criminal charges brought against the persons in question. You shall not misuse the information provided to gain unauthorized access. That said, you may try out these techniques your own computers and networks, or systems that you have authorization to test. Performing hacking attempts on computers that you do not own, without permission, is illegal.

source

Uncategorized