80
There is a wordpress website running: 
Running wpscan:
wpscan --url http://192.168.159.166 --api-token qa7plsUQx372hiQc5FQUPOjcfhGUCQ2Dp8DQi4ate2k
Searching in searchsploit:

Now we can exploit it: 
Now we can look for redis config files as it is running on port 6379
Then we can find the password in the file: 
Now we can use this to login to redis on port [[6379]]
Last updated
Was this helpful?