最近经常遇到wordpress博客站,猛然间想起kali linux中收录了一个强大的wordpress 利用工具!
经验心得如下!
这个工具无法直接用命令,需要进入到usr/bin文件夹中运行!
第一步,打开终端
输入cd /usr/bin
第二步,运行wpscan
在usr/bin 终端中输入命令。 wpscan -h
Help :
Some values are settable in conf/browser.conf.json :
user-agent, proxy, proxy-auth, threads, cache timeout and request timeout
–update Update to the latest revision
–url | -u The WordPress URL/domain to scan.
–force | -f Forces WPScan to not check if the remote site is running WordPress.
–enumerate | -e [option(s)] Enumeration.
option :
u usernames from id 1 to 10
u[10-20] usernames from id 10 to 20 (you must write [] chars)
p plugins
vp only vulnerable plugins
ap all plugins (can take a long time)
tt timthumbs
t themes
vt only vulnerable themes
at all themes (can take a long time)
Multiple values are allowed : ‘-e t,p’ will enumerate timthumbs and plugins
If no option is supplied, the default is ‘vt,tt,u,vp’
–exclude-content-based ‘’ Used with the enumeration option, will exclude all occurence based on the regexp or string supplied
You do not need to provide the regexp delimiters, but you must write the quotes (simple or double)
–config-file | -c Use the specified config file
–follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not
–wp-content-dir WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specified it. Subdirectories are allowed
–wp-plugins-dir Same thing than –wp-content-dir but for the plugins directory. If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed
–proxy Supply a proxy (will override the one from conf/browser.conf.json).
HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used
–proxy-auth Supply the proxy login credentials (will override the one from conf/browser.conf.json).
–basic-auth Set the HTTP Basic authentification
–wordlist | -w Supply a wordlist for the password bruter and do the brute.
–threads | -t The number of threads to use when multi-threading requests. (will override the value from conf/browser.conf.json)
–username | -U Only brute force the supplied username.
–help | -h This help screen.
–verbose | -v Verbose output.
Examples :
-Further help …
ruby /usr/bin/wpscan –help
-Do ‘non-intrusive’ checks …
ruby /usr/bin/wpscan –url www.example.com
-Do wordlist password brute force on enumerated users using 50 threads …
ruby /usr/bin/wpscan –url www.example.com –wordlist darkc0de.lst –threads 50
-Do wordlist password brute force on the ‘admin’ username only …
ruby /usr/bin/wpscan –url www.example.com –wordlist darkc0de.lst –username admin
-Enumerate installed plugins …
ruby /usr/bin/wpscan –url www.example.com –enumerate p
-Enumerate installed themes …
ruby /usr/bin/wpscan –url www.example.com –enumerate t
-Enumerate users …
ruby /usr/bin/wpscan –url www.example.com –enumerate u
-Enumerate installed timthumbs …
ruby /usr/bin/wpscan –url www.example.com –enumerate tt
-Use a HTTP proxy …
ruby /usr/bin/wpscan –url www.example.com –proxy 127.0.0.1:8118
-Use a SOCKS5 proxy … (cURL >= v7.21.7 needed)
ruby /usr/bin/wpscan –url www.example.com –proxy socks5://127.0.0.1:9000