Page 161 - Hands-On Bug Hunting for Penetration Testers
P. 161
Framework and Application-Specific Vulnerabilities Chapter 9
Then you have all the dependencies necessary to access the CLI using the EPDLFS SVO
command to bootstrap XQTDBO. Here's an example one-liner straight from Docker Hub
image's documentation:
docker run -it --rm wpscanteam/wpscan -u https://yourblog.com [options]
For testing purposes, the same team behind WPScan also provides a deliberately vulnerable
WordPress install, which is similarly run off of a Docker container. To build the image
locally, clone the GitHub repository (IUUQT HJUIVC DPN XQTDBOUFBN
7VMOFSBCMF8PSE1SFTT) and navigate into its root directory. Then, run the following
commands:
docker build --rm -t wpscan/vulnerablewordpress .
docker run --name vulnerablewordpress -d -p 80:80 -p 3306:3306
wpscan/vulnerablewordpress
Now, you should have a WordPress installation ready to be set up at MPDBMIPTU :
[ 146 ]

