April 29, 2023, 3:02 p.m. | IppSec

IppSec www.youtube.com

00:00 - Introduction
01:00 - Start of nmap, attempting to login with FTP then going to the website
02:45 - Running WPScan with enumerate all plugins in aggressive mode
04:00 - Taking a look at the site while WPScan runs and finding a plugin (BookingPress-Appointment-Booking) and finding an exploit
06:15 - Replacing the NONCE in the exploit to get it working
09:00 - Using SQLMap to dump everything, while we attempt to get only the data we think we are …

booking data exploit ftp hackthebox introduction login mode nmap nonce plugin plugins sqlmap start website working wpscan

SITEC - Pen Tester

@ Peraton | MacDill AFB, FL, United States

Information Security Specialist (Sr. OT Security Engineer)

@ Vertiv | Philippines

Product Security Engineer

@ Anduril | Costa Mesa, California, United States

Cybersecurity Tools Engineer

@ Uni Systems | Mons, Wallonia, Belgium

Baseband Security Lead

@ Babcock | Corsham, GB, SN13 9NP

Cyber Network Defense Analyst III

@ KBR, Inc. | VA149: 1110 N Glebe Road Arlington 1110 North Glebe Road Suite 630, Arlington, VA, 22201 USA