Page 166 - Hands-On Bug Hunting for Penetration Testers
P. 166

Framework and Application-Specific Vulnerabilities                          Chapter 9

            Once you've logged in for the first time, navigate over to the plain MPDBMIPTU    and view
            the actual home page of your WP site:
































            Keep in mind that you can't ping MPDBMIPTU    from XQTDBO because it's executing from
            inside the Docker container. In order to feed our Dockerized WP instance to our Dockerized
            WPScanning service, we need to use the URL of the Docker container running WordPress.

            We can find the Docker host IP by using EPDLFS QT to find the container ID of the Docker
            process running WP. We can then run EPDLFS JOTQFDU  $0/5"*/&3@*%  to return some
            JSON with the IP address. For us, that IP address is           . Then, we run this
            command to scan our vulnerable WordPress site. If we were targeting a site on the public
            internet, we could simply skip this step:
                wpscan --url 172.17.0.2:80

            Running the preceding command, this is what the output of our scan looks like:











                                                    [ 151 ]
   161   162   163   164   165   166   167   168   169   170   171