# Web Range-128 ## Challenge 128 ## Challenge 129  * Rustscan *  * Nmap *  * Wordpress website *  *  * dirsearch *  * WPScan *  ```zsh= wpscan --url http://10.10.1.62/ -e vp vt u ``` * Wpadmin *  * Using hydra got wpadmin's password *  *  * `admin:@6h$ER$*l3z` ```zsh= hydra -l admin -P Passwords.txt 10.10.1.62 http-post-form "/wp-login.php:log=^USER^&pwd=^PASS^:The password you entered for the username" ``` * 後台上傳plugin, 成功上傳phpinfo到`/wp-content/uploads/2025/08/info.php` *  *  * Upload webshell and got shell as `www-data` *  *  *  * `data.sh` has permission 777 *  * 有root的排程 *  * flag *  ## Answer * Challenge 128:`data.sh` * Challenge 129:`GfsgEE4FV`
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up