WPScan

Description

WPScan is a black box WordPress vulnerability scanner.

  • Penetration testers (or penetration testing organizations) using WPScan as part of their assessment toolkit.

  • Using WPScan to test your own systems.

  • Any non-commercial use of WPScan.

Usage

Options

--update Update to the database to the latest version.
--url | -u <target url> The WordPress URL/domain to scan.
--force | -f Forces WPScan to not check if the remote site is running WordPress.
--enumerate | -e [option(s)] Enumeration.
 option :
 u usernames from id 1 to 10
 u[10-20] usernames from id 10 to 20 (you must write [] chars)
 p plugins
 vp only vulnerable plugins
 ap all plugins (can take a long time)
 tt timthumbs
 t themes
 vt only vulnerable themes
 at all themes (can take a long time)
 Multiple values are allowed : "-e tt,p" will enumerate timthumbs and plugins
 If no option is supplied, the default is "vt,tt,u,vp"

--exclude-content-based "<regexp or string>"
 Used with the enumeration option, will exclude all occurrences based on the regexp or string supplied.
 You do not need to provide the regexp delimiters, but you must write the quotes (simple or double).
--config-file | -c <config file> Use the specified config file, see the example.conf.json.
--user-agent | -a <User-Agent> Use the specified User-Agent.
--cookie <String> String to read cookies from.
--random-agent | -r Use a random User-Agent.
--follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not
--batch Never ask for user input, use the default behavior.
--no-color Do not use colors in the output.
--wp-content-dir <wp content dir> WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specified it.
 Subdirectories are allowed.
--wp-plugins-dir <wp plugins dir> Same thing than --wp-content-dir but for the plugins directory.
 If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed
--proxy <[protocol://]host:port> Supply a proxy. HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported.
 If no protocol is given (format host:port), HTTP will be used.
--proxy-auth <username:password> Supply the proxy login credentials.
--basic-auth <username:password> Set the HTTP Basic authentication.
--wordlist | -w <wordlist> Supply a wordlist for the password bruter and do the brute.
--username | -U <username> Only brute force the supplied username.
--threads | -t <number of threads> The number of threads to use when multi-threading requests.
--cache-ttl <cache-ttl> Typhoeus cache TTL.
--request-timeout <request-timeout> Request Timeout.
--connect-timeout <connect-timeout> Connect Timeout.
--max-threads <max-threads> Maximum Threads.
--help | -h This help screen.
--verbose | -v Verbose output.

Example

cyborg@cyborg:~$ sudo wpscan -url http://192.168.1.18/wordpress
_______________________________________________________________
        __          _______   _____                  
        \ \        / /  __ \ / ____|                 
         \ \  /\  / /| |__) | (___   ___  __ _ _ __  
          \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \ 
           \  /\  /  | |     ____) | (__| (_| | | | |
            \/  \/   |_|    |_____/ \___|\__,_|_| |_|

 WordPress Security Scanner by the WPScan Team 
 Version 2.5.1
 Sponsored by the RandomStorm Open Source Initiative
 @_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
_______________________________________________________________


[+] URL: http://192.168.1.18/wordpress
[+] Started: Mon Oct 05 14:07:40 2015

[+] robots.txt available under: 'http://192.168.1.18/wordpress/robots.txt'
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/search
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/support/search.php
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/extend/plugins/search.php
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/plugins/search.php
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/extend/themes/search.php
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/themes/search.php
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/support/rss
[+] Interesting entry from robots.txt: http://192.168.1.18/wordpress/archive/
[+] Interesting header: SERVER: nginx
[+] Interesting header: X-FRAME-OPTIONS: SAMEORIGIN
[+] Interesting header: X-NC: HIT lax 249
[+] XML-RPC Interface available under: http://192.168.1.18/wordpress/xmlrpc.php

[+] WordPress version 4.3 identified from rss generator
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?