Wordpress
Enumeration (manual)
Browsing to Robot.txt file to identify a Wordpress site. The content of such file looks like this in Wordpress:
User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
Disallow: /wp-content/uploads/wpforms/
Sitemap: https://inlanefreight.local/wp-sitemap.xmlInteresting files and folders:
wp-content/plugins
Plugins are stored here
wp-content/themes
Themes are stored in this directory
#Identify Wordpress
curl -s http://blog.inlanefreight.local | grep WordPress
<meta name="generator" content="WordPress 5.8" /
# msf module to enumerate logged on users on wordpress
Use auxiliary/scanner/http/wordpress_login_enum
Identify Themes
Identify Plugins
Identify the plugins version
Brows to the plugin identified (e.g.: http://blog.inlanefreight.local/wp-content/plugins/mail-masta/)
Identify readme.txt and extract version number and any other helpful information from it
Enumerating users
WPSCAN
Wpscan helps to identify Wordpress version, plugins, themes and vulnerabilities automatically and must faster than manually:
Enumeration
Use WPSCAN with an API token to get the identified vulnerabilities. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register
Identify themes/plugins
Note down all interesting findings from your enumeration phase before starting exploitation phase
Attacks
Look for known vulnerability with searchsploit
upload a malicious plugin if you have admin privileges on the Wordpress application
Last updated