Skip to content

jonathang88/wpdiscuz-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

wpDiscuz Lab — Educational Report

Purpose: Educational lab documenting the discovery, exploitation path (conceptual), and remediation of a vulnerable WordPress plugin (wpDiscuz v7.0.4) in an isolated/lab environment.

Disclaimer: This repository is for educational and defensive purposes only. Do not use this material on systems you do not own or have permission to test.

Contents

  • lab-report.md — step-by-step sanitized report and findings.
  • notes/ — deeper notes (recon, exploitation concepts, privilege escalation, mitigations).
  • scripts/plugin_detector.py — safe script that checks for plugin version strings (non-exploitative).
  • screenshots/ — sanitized screenshots as evidence.

Quick summary

  • Target: WordPress instance with vulnerable plugin wpDiscuz (lab scenario).
  • Initial discovery: plugin version fingerprinted via aggressive plugin detection.
  • Exploitation path (conceptual): unauthenticated file upload → webshell upload → reverse shell → user context enumeration → exploitation of nokogiri (privilege escalation) → retrieval of sensitive files and keys.
  • Final result in lab: local root obtained (documented as learning outcome; sensitive artifacts redacted).

How to reproduce safely

  • Use the provided environment/docker-compose.example.yml to create an isolated VM/container lab.
  • Do not run exploit code on public networks.
  • Follow the notes/ for conceptual steps and mitigations.

How to contribute

  • Send PRs for improved documentation, sanitized evidence, or defensive scripts.
  • Do not add exploit payloads, private keys, or real credentials.

License

MIT — for educational use only.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages