What is a WPScan...?
WPScan is a vulnerability scanner tool for WordPress CMS written in the ruby programming language, WPScan is able to detect common vulnerabilities and list all the plugins and themes used by a website that uses WordPress CMS.
Wpscan tool developed by WPScan Team to find the weaknesses that exist on wordpress site. in this tool we can find the theme, plugin until the user registered on the site using wordpress.
WpScan Features :
- Enumerator username
- Multithreaded password bruteforcing
- WordPress plugin and version search
- Search vulnerability of wordpress web system
How to use WPScan in Kali Linux 2
Open your linux terminal and configure our computer to connect to the internet in order to update the database for the package
Then open wpscan app in Kali Linux then follow the following command :
Applications ->> Web Application Analysis ->> wpscan
This is the view of WPScan :
Then to see all the options that can be used on WPScan, we can use the command:
wpscan -h
Note :
Previously I apologize for "codex.wordpress.org" being targeted and not my intention to open privacy or drop but I just take an example just for knowledge of WordPress Security hole.
Then to find information from target wordpress we can use syntax :
wpscan -u http:// codex.wordpress.org
Next, to see the plugin that has been installed as well as see the plugin contained target wordpress vulnerability we can use the command :
wpscan -u http:// codex.wordpress.org --enumerate p
Then press "Y" to update the database then Enter and the scanning results we can see all the plugins used on the target WordPress (codex.wordpress.org).
Then from the scanning results we can see the memory used as a plugin on the target wordpress is for 115.109 MB.
Memory used : 115.109 MB
Next to see the information used themes along with its vulnerability we can use the command :
wpscan -u http:// codex.wordpress.org --enumerate t
Then press "Y" to update the database then Enter and the scanning results we can see all the Themes used on the target WordPress (codex.wordpress.org).
Memory used : 45.047 MB
Then to see "Timthumbs Plugin" information that is installed on the target wordpress we can use the command :
wpscan -u http:// codex.wordpress.org --enumerate tt
Then press "Y" to update the database then Enter and the scanning results we can see the memory used as a timthumb on the target wordpress is for 34.105 MB.
Memory used : 34.105 MB
Finally, to scan username on target wordpress we can use command :
wpscan -u http:// codex.wordpress.org --enumerate u
Here we can see on this wordpress target we do not find the username because it has good security and only wordpress with poor security is successfully done.
Enumerating usernames
We did not enumerating any usernames
Note :
-u : Syntax to address Wordpress url
--enumerate : Syntax used for Enumeration
u : Search username information on target wordpress
p : View plugins on target wordpress
tt : find timthumbs on target wordpress
t : themes on the target worpress
Posted on Utopian.io - Rewarding Open Source Contributors
Your contribution cannot be approved because it does not follow the Utopian Rules.
You can contact us on Discord.
[utopian-moderator]
@setdatyildiz I will check again