Category:Penetration-testing/Wordpress
Jump to navigation
Jump to search
Vulnerabilities
Tools/Scanner
Wpscan
Nmap NSE
$ nmap -p 80 -vv --script http-wordpress-enum --script-args type="plugins",search-limit=1500 127.0.0.1 Starting Nmap 7.80 ( https://nmap.org ) at 2021-05-03 18:01 CEST NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 18:01 Completed NSE at 18:01, 0.00s elapsed Initiating Ping Scan at 18:01 Scanning 127.0.0.1 [2 ports] Completed Ping Scan at 18:01, 0.00s elapsed (1 total hosts) Initiating Connect Scan at 18:01 Scanning localhost (127.0.0.1) [1 port] Discovered open port 80/tcp on 127.0.0.1 Completed Connect Scan at 18:01, 0.00s elapsed (1 total ports) NSE: Script scanning 127.0.0.1. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 18:01 Completed NSE at 18:01, 6.66s elapsed Nmap scan report for localhost (127.0.0.1) Host is up, received syn-ack (0.00025s latency). Scanned at 2021-05-03 18:01:27 CEST for 7s PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-wordpress-enum: | Search limited to top 1500 themes/plugins | plugins | duplicator 1.3.26 |_ wp-file-manager 6.0 NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 18:01 Completed NSE at 18:01, 0.00s elapsed Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 6.93 seconds
Pages in category "Penetration-testing/Wordpress"
The following 7 pages are in this category, out of 7 total.