Hello,
We are going to exploit one of OffSec Proving Grounds Medium machines which called Loly and this post is not a fully detailed walkthrough, I will just go through the important points during the exploit process.
Enumeration:
Nmap:
![image]()
- Using
wpscanagainst wordpress running on port80:1
wpscan --rua --url http://loly.lc/wordpress/ -P /usr/share/wordlists/rockyou.txt
- We found a valid Credentials for
wordpress:

Getting Shell:
First lets make a shell and zip it:
![image]()
Uploading the shell:
![image]()
Access the shell:
![image]()
We got RCE:
![image]()
Privilege Escalation:
- Creds on
wp-config.phpfile:
1
2
3
4
5
/** MySQL database username */
define( 'DB_USER', 'wordpress' );
/** MySQL database password */
define( 'DB_PASSWORD', 'lolyisabeautifulgirl' );
- Switching to
lolyuser using the password that we found onwp-config.phpfile:![image]()
Kernel Exploit:
Enumeration:
![image]()
- The Exploit:
- https://packetstormsecurity.com/files/148517/Linux-Kernel-Local-Privilege-Escalation.html
- Getting root:
![image]()
Happy Hacking!








Comments powered by Disqus.