lampungprov.go.id jatimprov.go.id jatimprov.go.id jabarprov.go.id sulutprov.go.id sulutprov.go.id kaltaraprov.go.id kepriprov.go.id sumbarprov.go.id jabarprov.go.id
mci.gov.sg cpf.gov.sg hdb.gov.sg ema.gov.sg ura.gov.sg nhb.gov.sg nparks.gov.sg sfa.gov.sg nric.gov.sg nrb.gov.sg
acehprov.go.id sumutprov.go.id sumbarprov.go.id riau.go.id kepriprov.go.id jambiprov.go.id bengkuluprov.go.id sumselprov.go.id babelprov.go.id lampungprov.go.id
Incident Summary
This report outlines the compromise of a WordPress server exploited through a vulnerable plugin by a threat actor. The attack, simulated in HackTheBox's Sherlock: Ultimatum challenge, targeted a known vulnerability in the Ultimate Member plugin, enabling the attacker to create a backdoor admin account and gain full control over the server. This detailed report examines the attack timeline, indicators of compromise (IoCs), and post-exploitation activities.
1. Objective
The objective of this investigation was to analyze the compromise of a WordPress server suspected of being attacked via a vulnerable plugin. The aim was to identify the exploit, document the attacker's methods, and gather actionable intelligence for remediation.
const deleteTweetsBetweenDates = async (startDate, endDate) => { | |
const processedButtons = new Set(); | |
const delay = (ms) => new Promise(resolve => setTimeout(resolve, ms)); | |
console.log("Script started"); | |
while (true) { | |
console.log("Looking for tweets..."); | |
const deleteButtons = Array.from(document.querySelectorAll('[data-testid="caret"]')) |
Date: August 13, 2024
Pentester: Eno Leriand
#!/bin/bash
# Variables
HOSTAPD_CONF="/etc/hostapd/hostapd.conf"
DNSMASQ_CONF="/etc/dnsmasq.conf"
HOTSPOT_IP="192.168.20.1"
DHCP_RANGE_START="192.168.20.10"
DHCP_RANGE_END="192.168.20.50"