๐Ÿดwordpress pentesting

Wordpress Pentesting

Enumeration

Wpscan

# Help menu
wpscan -h

# Non intrusive scan
wpscan --url <target-url>

# Plugins enumeration
wpscan --url www.example.com --enumerate p

# Users enumeration
wpscan --url www.example.com --enumerate u

Brute Force Attack

# Bruteforce users found using 50 threads
wpscan --url www.example.com --wordlist darkc0de.lst --threads 50

# Bruteforce on one user
wpscan --url www.example.com --wordlist darkc0de.lst --username admin

# Xmlrpc attack
wpscan --password-attack xmlrpc -U admin -P <password-wordlist> --url <target-url> 

Metasploit

xmlrpc

Shell Upload

XML-RPC Attack

xmlrpc.php

Send a POST request and list all the available methods

Bruteforce login

XSPA or simply port scanning

pingback.ping

References

Last updated

Was this helpful?