Pentesting Lab Exercises Series-Vulnhub
Virtual Machine Name: UA: Literally Vulnerable
Link: https://www.vulnhub.com/entry/ua-lite...
Important Tips:
Although we can login to the Wordpress management portal, but we can't get reverse shell by simply replacing 404.php template file with our reverse shell php file as usual. Then we can use metasploit to attempt to get reverse shell(meterpreter session), but failed to succeed in completing whole process. And in this virtual machine I manually set up the metasploit handler with the same payload. To be honest, this way is my first experience as demonstrated in the video. Because maybe other guys can get meterpreter session by simply running metasploit, but i failed. I think you will face the same issues that I had. So I tried the above mentioned way by which I successfully got the metepreter session.