π£Part III β Exploitation
πΉ 1. Brute Force & Weak Credentials
Default Credentials: Some admins never change defaults (
admin/admin,password123, etc.).Username Enumeration: Attackers can enumerate valid usernames via
/author/URLs, API responses, or error messages.Admin Panel Login Attacks: Attackers frequently target
/wp-login.phpor/xmlrpc.phpusing brute force or credential stuffing attacks. Weak or reused passwords are often enough for compromise.
πΉ 2. Find the Right Exploit
Where to Look: Exploit databases (Exploit-DB, Packet Storm), GitHub PoCs, and CVE feeds are prime sources.
Vulnerable Plugins & Themes: Attackers prioritize popular plugins/themes because they are widely installed.
Example β RevSlider: Historically one of the most exploited plugins, allowing unauthenticated file upload and arbitrary file read β full compromise.
πΉ 3. File Upload to RCE
Default Restrictions: WordPress normally restricts uploads to safe file types like
.jpg,.png,.pdf.Bypassing Restrictions:
MIME type misconfigurations
Double extensions like
shell.php.jpgUploading
.php5,.phtmlif server interprets them
Practical Exploitation:
Uploading & activating a malicious plugin
Uploading a malicious theme
Abusing the Media Library uploads
Exploiting File Upload Plugins: Contact forms, galleries, and membership systems often allow unsafe uploads.
Import / Export Exploits: Malicious XML/JSON payloads in vulnerable importers can lead to RCE.
Last updated