Category:Penetration-testing/Wordpress

From aldeid
Jump to navigation Jump to search

Vulnerabilities

https://wpvulndb.com/

Tools/Scanner

Wpscan

Nmap NSE

$ nmap -p 80 -vv --script http-wordpress-enum --script-args type="plugins",search-limit=1500 127.0.0.1
Starting Nmap 7.80 ( https://nmap.org ) at 2021-05-03 18:01 CEST
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 18:01
Completed NSE at 18:01, 0.00s elapsed
Initiating Ping Scan at 18:01
Scanning 127.0.0.1 [2 ports]
Completed Ping Scan at 18:01, 0.00s elapsed (1 total hosts)
Initiating Connect Scan at 18:01
Scanning localhost (127.0.0.1) [1 port]
Discovered open port 80/tcp on 127.0.0.1
Completed Connect Scan at 18:01, 0.00s elapsed (1 total ports)
NSE: Script scanning 127.0.0.1.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 18:01
Completed NSE at 18:01, 6.66s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up, received syn-ack (0.00025s latency).
Scanned at 2021-05-03 18:01:27 CEST for 7s

PORT   STATE SERVICE REASON
80/tcp open  http    syn-ack
| http-wordpress-enum: 
| Search limited to top 1500 themes/plugins
|   plugins
|     duplicator 1.3.26
|_    wp-file-manager 6.0

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 18:01
Completed NSE at 18:01, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 6.93 seconds

Pages in category "Penetration-testing/Wordpress"

The following 7 pages are in this category, out of 7 total.