update wpscan : a black box WordPress vulnerability scanner

update wpscan : a black box WordPress vulnerability scanner

Tool update : Added wp-useronline Persistent XSS & FPD
WPScan – WordPress Security Scanner

wpscan1

How to USAGE :
WPSCAN ARGUMENTS

–update Update to the latest revision

–url | -u <target url> The WordPress URL/domain to scan.

–force | -f Forces WPScan to not check if the remote site is running WordPress.

–enumerate | -e [option(s)] Enumeration.
option :
u usernames from id 1 to 10
u[10-20] usernames from id 10 to 20 (you must write [] chars)
p plugins
vp only vulnerable plugins
ap all plugins (can take a long time)
tt timthumbs
t themes
vt only vulnerable themes
at all themes (can take a long time)
Multiple values are allowed : ‘-e tt,p’ will enumerate timthumbs and plugins
If no option is supplied, the default is ‘vt,tt,u,vp’

–exclude-content-based ‘<regexp or string>’ Used with the enumeration option, will exclude all occurence based on the regexp or string supplied
You do not need to provide the regexp delimiters, but you must write the quotes (simple or double)

–config-file | -c <config file> Use the specified config file

–follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not

–wp-content-dir <wp content dir> WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specified it. Subdirectories are allowed

–wp-plugins-dir <wp plugins dir> Same thing than –wp-content-dir but for the plugins directory. If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed

–proxy <[protocol://]host:port> Supply a proxy (will override the one from conf/browser.conf.json).
HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used

–proxy-auth <username:password> Supply the proxy login credentials (will override the one from conf/browser.conf.json).

–basic-auth <username:password> Set the HTTP Basic authentification

–wordlist | -w <wordlist> Supply a wordlist for the password bruter and do the brute.

–threads | -t <number of threads> The number of threads to use when multi-threading requests. (will override the value from conf/browser.conf.json)

–username | -U <username> Only brute force the supplied username.

–help | -h This help screen.

–verbose | -v Verbose output.
WPSCAN EXAMPLES

Do ‘non-intrusive’ checks…

ruby wpscan.rb –url www.example.com

Do wordlist password brute force on enumerated users using 50 threads…

ruby wpscan.rb –url www.example.com –wordlist darkc0de.lst –threads 50

Do wordlist password brute force on the ‘admin’ username only…

ruby wpscan.rb –url www.example.com –wordlist darkc0de.lst –username admin

Enumerate installed plugins…

ruby wpscan.rb –url www.example.com –enumerate p

Run all enumeration tools…

ruby wpscan.rb –url www.example.com –enumerate

Use custom content directory…

ruby wpscan.rb -u www.example.com –wp-content-dir custom-content

Update WPScan…

ruby wpscan.rb –update

Download : wpscan.zip.(1,002 KB)
resources :  http://wpscan.org/ | https://github.com/wpscanteam/wpscan