In this video I demonstrate a penetration testing assessment on a vulnerable machine from vulnhub.com. This machine is called DerpNStink and I enjoyed working on it a lot.
In the first part of this demonstration my purpose is to find my way into the reverse - by getting a reverse shell. The vector of attack is through wordpress and an exploitable plugin.
I'm using a lot of enumeration tools and tactics to find that the server runs wordpress, to find the web-directory for wordpress, to find the users, as well as the exploitable plugin. So, the plugin is vulnerable to arbitrary file upload - meaning that a malicious user can upload a php shell and get inside the server.
In the second part. I will demonstrate how, once inside the server, I escalate my privileges from average user to root. And that part was even more insightful than this one.

To stay in touch with me, follow @cristi
Cristi Vlad Self-Experimenter and Author