WordPress Pentesting
Enumeration
nmap --script http-wordpress-brute -p 80 <target-ip>
nmap --script http-wordpress-enum --script-args type="plugins",search-limit=1500 -p 80 <target-ip>
nmap --script http-wordpress-users -p 80 <target-ip>
nmap --script http-wordpress-* -p 80 <target-ip>WpScan
wpscan --url https://example.com -P wordlist.txt
# Ignore TLS check (--disable-tls-checks)
wpscan --url https://example.com -P wordlist.txt --disable-tls-checks
# --rua: random user agent
# --http-auth username:password
# -e: enumerate
# ap: All plugins
# at: All themes
# tt: Timthumbs
# cb: Config backups
# dbe: Db exports
# u: User IDs range
# m: Media IDs range
wpscan --rua -e ap,at,tt,cb,dbe,u,m --url https://example.com -P /usr/share/wordlists/rockyou.txt
# Specifify username (-U)
wpscan --rua -e ap,at,tt,cb,dbe,u,m --url https://example.com -U username -P /usr/share/wordlists/rockyou.txtVersion Detection
Interesting Directories/Files
Try to Login with Default Credential
Path Traversal
Reverse Shell
Metasploit
PHP Reverse Shell Injection
XML-RPC (xmlrpc.php)
XXE (CVE-2021-29447)
Decode Base64
SSRF
oEmbed Proxy
Last updated