Summary

  • The author performed a Nmap scan on the target IP address 10.10.231.132, and found that ports 22 and 80 were open.
  • They then focused on port 80, which was hosting a WordPress website.
  • After performing a ffuf scan using a common directory list, the author was unable to find any accessible directories or files.
  • It is suggested that in the future, the author could perform a brute force attack on the URL parameters, as well as perform a WordPress plugin vulnerability scan, since the platform was already identified.

By Error

Original Article