Exploiting the vulnerability using Metasploit

Running the exploit against a target will give us the data stored in the wp_users table, as shown here:

Next, we will look at the third and final part of WordPress exploitation.

Get Hands-On Web Penetration Testing with Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.