On Cyber War
TwitterGitHubLinkedIn
  • Welcome
  • Source Zero Con References
  • 1. Reconnaissance/ OSINT
    • Information gathering
    • OSINT tools
    • Search Engine OSINT
    • Sock puppets
  • 2. Scanning
    • Host discovery
    • Port Scanning with Nmap
    • Nmap Scripting Engine
  • 3. Enumeration
    • 21 - FTP
    • 22 - SSH
    • 25 - SMTP
    • 53 - DNS
    • 80/443 - HTTP(s)
    • 111 - NFS
    • 135 - RPC
    • 139/445 - NetBIOS/SMB
    • 161 (UDP) - SNMP
    • Wordpress
    • Finger (Solaris)
    • Active Directory
  • 4. Exploitation
    • Public exploits
    • Web application attacks
      • Command injection
      • Cross site scripting
      • Directory traversal
      • File inclusion
      • SQL injection
    • Password attacks
    • Buffer overflows
    • Active Directory
    • Metasploit
  • 5. Maintaining access
    • Upgrading simple shells
    • Reverse shells
    • MSFvenom
    • File transfers
    • Linux privilege escalation
    • Windows privilege escalation
    • Tunneling/Port Forwarding
  • 6. Miscellaneous
    • Connections
  • 7. Walkthroughs
    • HTB - Blunder
    • HTB - Haircut
    • THM -HackPark
Powered by GitBook
On this page
  • Manual enumeration
  • wpscan
  1. 3. Enumeration

Wordpress

Previous161 (UDP) - SNMPNextFinger (Solaris)

Last updated 4 years ago

Manual enumeration

  • Enumerate users by reviewing the archives and taking note of authors of blog posts

  • If you identify a login page, attempt to login with common credentials (admin, password, etc.).

    • Pay attention to errors produced through failed logins

wpscan

wpscan is an open source scanner included with Kali.

If you use another distro you can download it here:

Documentation here:

Enumerating users

wpscan --url https://target.tld/ --enumerate u
wpscan --url example.com -e u
wpscan --url https://target.tld/ --enumerate u1-100

Brute force

wpscan --url example.com -e u --passwords /path/to/password_file.txt
wpscan --url example.com --passwords /usr/share/wordlists/rockyou.txt --usernames admin --max-threads 50

Scanning plugins

wpscan --url example.com -e vp --plugins-detection mixed --api-token YOUR_TOKEN

Enumeration modes

To enumerate version, plugins or themes, select from three modes: passive, aggressive, mixed. The default is mixed for most items, and passive for plugin detection. To override the default use the--plugins-detection option.

Mixed - provides the most results
Passive - useful when server overload is a concern
Aggressive - most aggressive

Other enumeration options

The following enumeration options are available and should be preceded by the -e flag. If no additional options are provided the default is: vp,vt,tt,cb,dbe,u,m

  • vp (Vulnerable plugins)

  • ap (All plugins)

  • p (Popular plugins)

  • vt (Vulnerable themes)

  • at (All themes)

  • t (Popular themes)

  • tt (Timthumbs)

  • cb (Config backups)

  • dbe (Db exports)

  • u (User IDs range. e.g: u1-5)

  • m (Media IDs range. e.g m1-15

https://github.com/wpscanteam/wpscan
https://github.com/wpscanteam/wpscan/wiki/WPScan-User-Documentation