Tuesday, October 8, 2024
HomePENTESTINGWPScan - Penetration Testing Tool to Find The Security Vulnerabilities in...

WPScan – Penetration Testing Tool to Find The Security Vulnerabilities in Your WordPress Websites

Published on

WPScan is a WordPress security scan for detecting and reporting WordPress vulnerabilities.

WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one of the most powerful and most used blogging tools.

As there are too many up’s and downs in WordPress usage, it requires security improvement, so WordPress Penetration testing is essential to find the vulnerabilities and secure your WordPress-powered Website.

- Advertisement - EHA

WordPress Penetration testing with WPScan

It is a WordPress vulnerability scanner created by Ryan Dewhurst and it was sponsored by Sucuri.

It comes pre-installed with BackBox Linux, Kali Linux, Pentoo, SamuraiWTF, and BlackArch and it will not support Windows.

With this tool, we can enumerate themes, plugins, users, and HTTP proxy and will not check the source code of the page.

Installation

git clone https://github.com/wpscanteam/wpscan

cd wpscan/

bundle install && rake install

To Enumerate WordPress versions, themes and plugin

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate p wpscan –url http://tutorials.gbhackers.com/test/ –enumerate t

Penetration testing

To Enumerate WordPress Users

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate u

Penetration testing

To launch a brute-force attack

wpscan –url http://tutorials.gbhackers.com/test/ –wordlist /root/Desktop/password.txt –username kcwto

Penetration testing

To Enumerate timthumbs

If you are still using TimThumb, even after a very serious vulnerability, you have one more reason to be concerned.

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate tt

Penetration testing

To store Output in a separate File

wpscan –url http://tutorials.gbhackers.com/test/ –debug-output 2>debug.log

Penetration testing is an art and the active analysis depends upon the security researcher, here we evaluated some of the basic and important checks that need to be done on the WordPress-powered website.

Disclaimer

This article with WPScan was created only for legal security testing, you should use the tool only for Testing purposes and you are not intended to use them against any unknown websites. Misuse of the information on this website can result in criminal charges brought against the persons in question. The Authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information on this website to break the law.

Also Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined...

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...

Top 10 Best Penetration Testing Companies & Services in 2024

Penetration Testing Companies are pillars of information security; nothing is more important than ensuring...

Gesture Jacking – New Attack That Deceives Website Visitors

The Web Platform is incredibly powerful, but regrettably, malicious websites will do all in...