Commit c4fd29

2025-12-19 11:53:57 Elijah Ketchersid: init2
cybersecurity/hackthebox/cpts/getting started/public exploits.md ..
@@ 4,7 4,8 @@
Firstly, make sure to spawn the target in, in my case,
- ![](./image-1766142303603.png)
+ ![](./image-1766145205996.png)
+
Something to note about hackthebox attacks that isn't mentioned within the academy, is that the port number is where the malicious *thing* is, it's a neat little hint for things like this.
@@ 57,7 58,7 @@
```
Here we can see it's "Just Another Wordpress Site". Therefore, if we try to go to the domain:
- ![](./image-1766144389277.png)
+ ![](./image-1766145227218.png)
Now it's time to use metasploit and see what we can do
```
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9