Published on

0xL4ughctf 2024 - Wordpress 2

Authors
  • avatar
    Name
    Lumy
    Twitter

Wordpress 2

Q1. During enumeration, the attacker tried to identify users on the site. List all the users that the attacker enumerated. (seperate them with 3), (sort them by alphapitical order)

Q2. After enumeration, a brute force attack was launched against all users. The attacker successfully gained access to one of the accounts.What are the username and password for that account, and what is the name of the page used for the brute force attack?

Flag Format OxL4ugh{A1_A2} Example: 0xL4ugh{username1:username2_username:password_pageName.ext}

Table of Contents

  1. Source
  2. Solution

Source

The challenge gives us a pcap file : Wordpress.pcapng

Solution

Let's see which what are the users that has been bruteforced. For that we can see the endpoint /wordpress/author/XXX

users

To gather the password bruteforced, we can see an XMLRPC request with an odd length, containing the isAdmin variable

isAdmin

Finally, we can thus gather the initial attacker request for this response by following HTTP request

versions

Flag : 0xL4ugh{a1l4m:demomorgan:not7amoksha_demomorgan:demomorgan_xmlrpc.php}