Wordpress

Enumeration (manual)

  • Browsing to Robot.txt file to identify a Wordpress site. The content of such file looks like this in Wordpress:

User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
Disallow: /wp-content/uploads/wpforms/

Sitemap: https://inlanefreight.local/wp-sitemap.xml
  • Interesting files and folders:

Directory
Type

wp-content/plugins

Plugins are stored here

wp-content/themes

Themes are stored in this directory

#Identify Wordpress
curl -s http://blog.inlanefreight.local | grep WordPress
    <meta name="generator" content="WordPress 5.8" /

# msf module to enumerate logged on users on wordpress
Use auxiliary/scanner/http/wordpress_login_enum

  • Identify Themes

  • Identify Plugins

WPSCAN

Wpscan helps to identify Wordpress version, plugins, themes and vulnerabilities automatically and must faster than manually:

Enumeration

Use WPSCAN with an API token to get the identified vulnerabilities. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

  • Identify themes/plugins

Note down all interesting findings from your enumeration phase before starting exploitation phase

Attacks

  • Look for known vulnerability with searchsploit

  • upload a malicious plugin if you have admin privileges on the Wordpress application

Last updated