Wordpress
Theory
Practice
Tools
#Enumerate plugins,themes,Timthumbs,config backups,DB exports,users,media and search for vulnerabilities using a free API token (up 50 searchs)
wpscan --rua -e ap,at,tt,cb,dbe,u,m --url http://www.vuln.com [--plugins-detection aggressive] [--detection-mode aggressive] [--api-token <API_TOKEN>]
#Specify username and brute-force (it use XML-RPC if available)
#--password-attack xml-rpc will use XML-RPC to brute-force
wpscan --rua --url http://www.vuln.com -U username --passwords /usr/share/wordlists/external/SecLists/Passwords/probable-v2-top1575.txt [--password-attack xml-rpc]#Brute-force passwords on /wp-login.php
nmap --script http-wordpress-brute <target-ip>
#Enumerate plugins or themes
nmap --script http-wordpress-enum --script-args type="plugins",search-limit=1500 -p 80 <target-ip>
#Enumerates usernames by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
nmap --script http-wordpress-users -p 80 <target-ip>
#Perform all wordpress scans
nmap --script http-wordpress-* -p 80 <target-ip>Enumerate Wordpress Version
<meta name="generator" content="WordPress x.x.x" />curl https://victim.com/ | grep 'content="WordPress'/license.txt
/readme.htmlcurl -s -X GET https://wordpress.org/support/article/pages/ | grep http | grep -E '?ver=' | sed -E 's,href=|src=,THIIIIS,g' | awk -F "THIIIIS" '{print $2}' | cut -d "'" -f2Enumerate Users
Brute-force Passwords
Reverse Shell
Vulnerabilities
Unauthenticated View Private/Draft Posts - CVE-2019-17671
Authenticated XXE (CVE-2021-29447)
Crop-image Shell Upload - CVE-2019-8942, CVE-2019-8943
Unauthorized Password Reset - CVE-2017-8295
SSRF
Post-Exploitation
Resources
Last updated