WordPress Security Scanner 'WPScan' Version 3.7.5

English

WordPress security scanner 'WPScan' Version 3.7.5, is a black box WordPress vulnerability scanner, that can be used to scan remote WordPress installations to find security issues.

It is also the second logical step to using the built-in whatweb command, which gives you limited information about a site you suspect is running WordPress.

IMPORTANT: Never do this from an unsecure computer, over an insecure connection: For example, always use VPN, there are no exceptions !

License: free, for non-commercial use.

Legal disclaimer: Usage of commix for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. The owner, this website assume no liability and are not responsible for any misuse or damage caused by this program or the usage of any tutorial on this website.

WordPress security scanner 'WPScan' Version 3.7.5.

First command you should issue is:

wpscan –url https://example.com

Press Enter and watch the tool go to work.

See the less intrusive results below:


Interesting Entries:
 |  - x-srcache-fetch-status: HIT
 |  - x-srcache-store-status: BYPASS
 |  - cf-cache-status: DYNAMIC
 |  - expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
 |  - server: cloudflare
 |  - cf-ray: xxxxxxxxx00xxxxx-OTP
 | Found By: Headers (Passive Detection)
 | Confidence: 100%

[+] https://www.example.com/robots.txt
 | Found By: Robots Txt (Aggressive Detection)
 | Confidence: 100%

[+] http://www.example.com/xmlrpc.php
 | Found By: Headers (Passive Detection)
 | Confidence: 100%
 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
 | References:
 |  - http://codex.wordpress.org/XML-RPC_Pingback_API
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost...
 |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrp...
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingb...

[+] https://www.example.com/xmlrpc.php
 | Found By: Link Tag (Passive Detection)
 | Confidence: 30%
 | References:
 |  - http://codex.wordpress.org/XML-RPC_Pingback_API
 |  - https://www.example.com/db/modules/auxiliary/scanner/http/wordpress_ghos...
 |  - https://www.example.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
 |  - https://www.example.com/db/modules/auxiliary/scanner/http/wordpress_xmlr...
 |  - https://www.example.com/db/modules/auxiliary/scanner/http/wordpress_ping...

[+] This site has 'Must Use Plugins': https://www.example.com/wp-content/mu-plugins/
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 80%
 | Reference: http://codex.wordpress.org/Must_Use_Plugins

[+] https://www.example.com/wp-cron.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 60%
 | References:
 |  - https://www.iplocation.net/defend-wordpress-from-ddos
 |  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.3.1 identified (Latest, released on 2019-12-12).
 | Found By: Rss Generator (Passive Detection)
 |  - https://www.example.com/comments/feed/, <generator>https://wordpress.org/?v=5.3.1</generator>
 |  - https://www.example.com/homepage-masonry-layout/feed/, <generator>https://wordpress.org/?v=5.3.1</generator>

[+] WordPress theme in use: sahifa
 | Location: https://www.example.com/wp-content/themes/sahifa/
 | Style URL: https://www.example.com/wp-content/themes/sahifa/style.css
 | Description: before{content:"\f29e"}.fa-volume-control-phone:before{content:"\f2a0"}.fa-braille:before{content:"\...
 |
 | Found By: Css Style In 404 Page (Passive Detection)
 | Confirmed By:
 |  Urls In Homepage (Passive Detection)
 |  Urls In 404 Page (Passive Detection)
 |
 | The version could not be determined.

[+] Enumerating All Plugins (via Passive Methods)
[+] Checking Plugin Versions (via Passive and Aggressive Methods)

[i] Plugin(s) Identified:

[+] amazon-associates-link-builder
 | Location: https://www.example.com/wp-content/plugins/amazon-associates-link-builder/
 | Latest Version: 1.9.3
 | Last Updated: 2019-08-05T16:10:00.000Z
 |
 | Found By: Urls In Homepage (Passive Detection)
 | Confirmed By: Urls In 404 Page (Passive Detection)
 |
 | The version could not be determined.

[+] arscode-ninja-popups
 | Location: https://www.example.com/wp-content/plugins/arscode-ninja-popups/
 |
 | Found By: Urls In Homepage (Passive Detection)
 |
 | The version could not be determined.

[+] jetpack
 | Location: https://www.example.com/wp-content/plugins/jetpack/
 | Latest Version: 8.0
 | Last Updated: 2019-12-03T14:00:00.000Z
 |
 | Found By: Urls In Homepage (Passive Detection)
 | Confirmed By: Urls In 404 Page (Passive Detection)
 |
 | The version could not be determined.

[+] taqyeem
 | Location: https://www.example.com/wp-content/plugins/taqyeem/
 |
 | Found By: Urls In Homepage (Passive Detection)
 | Confirmed By: Urls In 404 Page (Passive Detection)
 |
 | The version could not be determined.

[+] taqyeem-buttons
 | Location: https://www.example.com/wp-content/plugins/taqyeem-buttons/
 |
 | Found By: Urls In Homepage (Passive Detection)
 | Confirmed By: Urls In 404 Page (Passive Detection)
 |
 | The version could not be determined.

[+] Enumerating Config Backups (via Passive and Aggressive Methods)
 Checking Config Backups - Time: 00:00:06 <=================================================

[i] No Config Backups Found.

[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com

[+] Finished: Sat Dec 14 03:49:44 2019
[+] Requests Done: 60
[+] Cached Requests: 24
[+] Data Sent: 20.675 KB
[+] Data Received: 450.808 KB
[+] Memory used: 155.021 MB
[+] Elapsed time: 00:01:03

For more information, type:

wpscan --help

Press Enter.


IMPORTANT! To find vulnerabilities, you need to be registered for an API-key here.

[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com

They offer free 50 dayily requests, 250 requests for 25€ or if you need unlimited database requests, you need to contact them.
Rate This: 
No votes yet

Featured Sponsors

Games For Linux

Windows has always been the preferred platform for gaming, but after STEAM's interest in Linux more game developers are making their games natively available for Linux.

Disclaimer

All information on this website is published in good faith and for general educational purposes and for use in safe testing environments only. While linuxexperten.com strives to make the information on this site as accurate as possible, linuxexperten.com does not warrant its completeness, reliability and accuracy.

We are not responsible for any losses or damages associated with the use of our website. While we strive to provide only links to useful websites, we have no control over the content of these sites and links to other sites do not constitute a recommendation for all content contained on these websites.

 

Site Information

This is a professional review site that receives compensation from the companies whose products reviewed. Each service or product are thoroughly tested and given high marks if considered to be the very best. Independently owned and the opinions expressed here are no one elses.