Page 161 - Hands-On Bug Hunting for Penetration Testers
P. 161

Framework and Application-Specific Vulnerabilities                          Chapter 9

            Then you have all the dependencies necessary to access the CLI using the EPDLFS SVO
            command to bootstrap XQTDBO. Here's an example one-liner straight from Docker Hub
            image's documentation:

                docker run -it --rm wpscanteam/wpscan -u https://yourblog.com [options]

            For testing purposes, the same team behind WPScan also provides a deliberately vulnerable
            WordPress install, which is similarly run off of a Docker container. To build the image
            locally, clone the GitHub repository (IUUQT   HJUIVC DPN XQTDBOUFBN
            7VMOFSBCMF8PSE1SFTT) and navigate into its root directory. Then, run the following
            commands:
                docker build --rm -t wpscan/vulnerablewordpress .
                docker run --name vulnerablewordpress -d -p 80:80 -p 3306:3306
                wpscan/vulnerablewordpress

            Now, you should have a WordPress installation ready to be set up at MPDBMIPTU   :










































                                                    [ 146 ]
   156   157   158   159   160   161   162   163   164   165   166