Impatient person’s walkthrough of Deception on Offensive Security’s Proving Grounds (Vulnhub)
1. Scan reveals tcp 22,80 2. gobuster/dirb shows us a wordpress installation 3. wpscan –url http://$targetIP/wordpress –enumerate u shows us two user names. (Redacted here. Figure it out.) 4. curl…