×
Let's run dirsearch on the website: But looks like every page redirects to index.php . But we can use command line tools to see what is on that page.
Missing: q= https% 3A% 2F% 2Fblog. 2f 2F2019-
Jul 11, 2019 · Writeups for Vulnhub's boot2root machines that I've done - vulnhub-writeups/2019-07-11-DC4.md at master · mzfr/vulnhub-writeups.
Missing: q= https% 3A% 2F% 2Fblog. 2f 2F2019-
Jul 12, 2019 · Second machine in the DC series and this includes bruteforcing Wordpress credentials. This writeup will take you through each step of rooting this machine.
Missing: q= https% 3A% 2Fblog. 2F2019- 11- DC4
Today, I used Hydra, I learned something new, and that makes this write-up worth it or more than one level. Continuing on with the DC series of boxes.
Missing: q= https% 3A% 2F% 2Fblog. mzfr. 2f 2F2019- 07- 11-
Sep 6, 2019 · I decided to run SQLmap on it. Sqlmap found nid to be vulnerable and using that I got 2 DB in output. ➜ sqlmap -u http://192.168.56.122/\?nid\= --level 4 --dbs
Missing: q= 3A% 2Fblog. 2F2019- 07- 11- DC4
Apr 7, 2019 · DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
Missing: q= 3A% 2F% 2Fblog. mzfr. 2f 2F2019- 11-
Drush is a command line shell and Unix scripting interface for Drupal. Drush core ships with lots of useful commands for interacting with code like modules/ ...
Missing: q= 3A% 2Fblog. 2F2019- 11- DC4
This looks like a drupal website but it's actually not. It's just simple php website. I started to look around but couldn't find anything interesting.
Missing: q= https% 3A% 2Fblog. 2F2019- 07- 11- DC4