Summarizing the entire test, we performed the following operations:
- Port scan on 192.168.10.110 (port 80 open).
- Brute-forced directories on port 80 (WordPress and PHP Utility Belt found).
- Exploited PHP Utility Belt to gain PHP meterpreter access.
- Escalated to Windows meterpreter.
- Post-exploitation to figure out the presence of an internal network.
- Added routes to the internal network (Metasploit only).
- Port scan on the internal network 172.28.128.0.
- Discovered 3306 (MySQL) and 80 (Apache) on 172.28.128.3.
- Fingerprinted, gained access to MySQL, and harvested the credentials for the WordPress domain running on 192.168.10.110.
- Cracked hashes for the WordPress website using hashcat.
- Brute-forced directories on port 80