What do you use to check the security of your wordpress?
sudo apt install rubyNow the dependencies
sudo apt install build-essential libcurl4-openssl-dev libxml2 libxml2-dev libxslt1-dev ruby-dev libgmp-dev zlib1g-devAnd finally the tool
sudo gem install wpscanThe installation is very simple. Once installed we will see the help by typing
wpscan --hhWe already have the tool installed, now we will check our WordPress with vulnerability in Contact Form 7. In order to use the API you need to register at wpvulndb.com , where I recommend you also activate the checkbox "Receive a monthly digest for new vulnerabilities" to be up to date, we usually receive a few mails during the month. Ok, we are supposed to have registered and have the API token, let's use the following basic command
wpscan --url http://webwewanttoscan.com --api-token followedbyyourtokenAnd it will return us the vulnerabilities that have been in the different plugins by versions and which is the one that we have, in our case we have put the 5.0.3 of Contact Form 7 on purpose. As we can see it tells us that the plugin is outdated and that we have version 5.0.3 with a privilege escalation vulnerability and its references. If you take a look at the help you can see what else we can do, such as enumerate users, theme, plugins, the type of detection mixed,passive,aggressive, activate the verbose mode and even test brute force attacks with dictionaries. Some example:
- Scan vulnerable plugins in aggressive mode with verbose enabled.
wpscan --url https://webwewanttoscan.com --enumerate vp --detection-mode aggressive -v
- Brute force testing using a dictionary and 20 simultaneous threads for user wpadmin
wpscan --url https://webwewanttoscan.com --wordlist dictionaries.lst --username wpadmin --threads 20
- List users
wpscan --url https://webwewanttoscan.com --enumerate uYou can spend some time testing things with this tool. Remember that karma is not confined by covid-19.
Thanks for reading our posts.