Published on

0xL4ughctf 2024 - Wordpress 1

Authors
  • avatar
    Name
    Lumy
    Twitter

Wordpress 1

Our WordPress site has experienced a security breach, and the precise method of compromise remains undetermined at present. We need you help to investigate what actually happened.

Q1. There were two attackers attempting to compromise our environment. What is the IP address of the victim, and what is the IP address of the first attacker? Q2. 2. What are the versions of the Apache and PHP servers deployed in our environment?

Flag Format OxL4ugh{A1_A2}

Example: 0xL4ugh{IP1_IP2_apache1.2.3_php1.2.3}(no spaces)

Table of Contents

  1. Source
  2. Solution

Source

The challenge gives us a pcap file : Wordpress.pcapng

Solution

Let's see which IP are communicating with the server. We keep in mind that we need to see eventually suspicous events

Ip1 Ip2

Finally, we can gather version server through the response banner

versions

Flag : 0xL4ugh{192.168.204.128_192.168.204.132_apache2.4.58_php8.2.12}