WPScan – Penetration Testing Tool to Find The Security Vulnerabilities in Your WordPress Websites

WPScan is a WordPress security scan for detecting and reporting WordPress vulnerabilities.

WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one of the most powerful and most used blogging tools.

As there are too many up’s and downs in WordPress usage, it requires security improvement, so WordPress Penetration testing is essential to find the vulnerabilities and secure your WordPress-powered Website.

WordPress Penetration testing with WPScan

It is a WordPress vulnerability scanner created by Ryan Dewhurst and it was sponsored by Sucuri.

It comes pre-installed with BackBox Linux, Kali Linux, Pentoo, SamuraiWTF, and BlackArch and it will not support Windows.

With this tool, we can enumerate themes, plugins, users, and HTTP proxy and will not check the source code of the page.

Installation

git clone https://github.com/wpscanteam/wpscan

cd wpscan/

bundle install && rake install

To Enumerate WordPress versions, themes and plugin

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate p wpscan –url http://tutorials.gbhackers.com/test/ –enumerate t

Penetration testingPenetration testing

To Enumerate WordPress Users

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate u

To launch a brute-force attack

wpscan –url http://tutorials.gbhackers.com/test/ –wordlist /root/Desktop/password.txt –username kcwto

To Enumerate timthumbs

If you are still using TimThumb, even after a very serious vulnerability, you have one more reason to be concerned.

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate tt

To store Output in a separate File

wpscan –url http://tutorials.gbhackers.com/test/ –debug-output 2>debug.log

Penetration testing is an art and the active analysis depends upon the security researcher, here we evaluated some of the basic and important checks that need to be done on the WordPress-powered website.

Disclaimer

This article with WPScan was created only for legal security testing, you should use the tool only for Testing purposes and you are not intended to use them against any unknown websites. Misuse of the information on this website can result in criminal charges brought against the persons in question. The Authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information on this website to break the law.

Also Read:

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has been…

6 hours ago

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek…

7 hours ago

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing…

7 hours ago

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other esoteric…

7 hours ago

Hackers Exploit Cloudflare for Advanced Phishing Attacks

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the…

7 hours ago

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack

A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy…

7 hours ago