LinuxCommandLibrary

wpscan

Wordpress vulnerability scanner.

TLDR

Update the vulnerability database

$ wpscan --update
copy


Scan a WordPress website
$ wpscan --url [url]
copy


Scan a WordPress website, using random user agents and passive detection
$ wpscan --url [url] --stealthy
copy


Scan a WordPress website, checking for vulnerable plugins and specifying the path to the wp-content directory
$ wpscan --url [url] --enumerate [vp] --wp-content-dir [remote/path/to/wp-content]
copy


Scan a WordPress website through a proxy
$ wpscan --url [url] --proxy [protocol://ip:port] --proxy-auth [username:password]
copy


Perform user identifiers enumeration on a WordPress website
$ wpscan --url [url] --enumerate [u]
copy


Execute a password guessing attack on a WordPress website
$ wpscan --url [url] --usernames [username|path/to/usernames.txt] --passwords [path/to/passwords.txt] threads [20]
copy


Scan a WordPress website, collecting vulnerability data from the WPVulnDB ()
$ wpscan --url [url] --api-token [token]
copy

Help

_______________________________________________________________ 
         __          _______   _____ 
         \ \        / /  __ \ / ____| 
          \ \  /\  / /| |__) | (___   ___  __ _ _ __ ® 
           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \ 
            \  /\  /  | |     ____) | (__| (_| | | | | 
             \/  \/   |_|    |_____/ \___|\__,_|_| |_| 

         WordPress Security Scanner by the WPScan Team 
                         Version 3.8.15 
                                
       @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart 
_______________________________________________________________ 

Usage: wpscan [options] 
        --url URL                                 The URL of the blog to scan 
                                                  Allowed Protocols: http, https 
                                                  Default Protocol if none provided: http 
                                                  This option is mandatory unless update or help or hh or version is/are supplied 
    -h, --help                                    Display the simple help and exit 
        --hh                                      Display the full help and exit 
        --version                                 Display the version and exit 
    -v, --verbose                                 Verbose mode 
        --[no-]banner                             Whether or not to display the banner 
                                                  Default: true 
    -o, --output FILE                             Output to FILE 
    -f, --format FORMAT                           Output results in the format supplied 
                                                  Available choices: cli-no-color, json, cli, cli-no-colour 
        --detection-mode MODE                     Default: mixed 
                                                  Available choices: mixed, passive, aggressive 
        --user-agent, --ua VALUE 
        --random-user-agent, --rua                Use a random user-agent for each scan 
        --http-auth login:password 
    -t, --max-threads VALUE                       The max threads to use 
                                                  Default: 5 
        --throttle MilliSeconds                   Milliseconds to wait before doing another web request. If used, the max threads will be set to 1. 
        --request-timeout SECONDS                 The request timeout in seconds 
                                                  Default: 60 
        --connect-timeout SECONDS                 The connection timeout in seconds 
                                                  Default: 30 
        --disable-tls-checks                      Disables SSL/TLS certificate verification, and downgrade to TLS1.0+ (requires cURL 7.66 for the latter) 
        --proxy protocol://IP:port                Supported protocols depend on the cURL installed 
        --proxy-auth login:password 
        --cookie-string COOKIE                    Cookie string to use in requests, format: cookie1=value1[; cookie2=value2] 
        --cookie-jar FILE-PATH                    File to read and write cookies 
                                                  Default: /tmp/wpscan/cookie_jar.txt 
        --force                                   Do not check if the target is running WordPress or returns a 403 
        --[no-]update                             Whether or not to update the Database 
        --api-token TOKEN                         The WPScan API Token to display vulnerability data, available at https://wpscan.com/profile 
        --wp-content-dir DIR                      The wp-content directory if custom or not detected, such as "wp-content" 
        --wp-plugins-dir DIR                      The plugins directory if custom or not detected, such as "wp-content/plugins" 
    -e, --enumerate [OPTS]                        Enumeration Process 
                                                  Available Choices: 
                                                   vp   Vulnerable plugins 
                                                   ap   All plugins 
                                                   p    Popular plugins 
                                                   vt   Vulnerable themes 
                                                   at   All themes 
                                                   t    Popular themes 
                                                   tt   Timthumbs 
                                                   cb   Config backups 
                                                   dbe  Db exports 
                                                   u    User IDs range. e.g: u1-5 
                                                        Range separator to use: '-' 
                                                        Value if no argument supplied: 1-10 
                                                   m    Media IDs range. e.g m1-15 
                                                        Note: Permalink setting must be set to "Plain" for those to be detected 
                                                        Range separator to use: '-' 
                                                        Value if no argument supplied: 1-100 
                                                  Separator to use between the values: ',' 
                                                  Default: All Plugins, Config Backups 
                                                  Value if no argument supplied: vp,vt,tt,cb,dbe,u,m 
                                                  Incompatible choices (only one of each group/s can be used): 
                                                   - vp, ap, p 
                                                   - vt, at, t 
        --exclude-content-based REGEXP_OR_STRING  Exclude all responses matching the Regexp (case insensitive) during parts of the enumeration. 
                                                  Both the headers and body are checked. Regexp delimiters are not required. 
        --plugins-detection MODE                  Use the supplied mode to enumerate Plugins. 
                                                  Default: passive 
                                                  Available choices: mixed, passive, aggressive 
        --plugins-version-detection MODE          Use the supplied mode to check plugins' versions. 
                                                  Default: mixed 
                                                  Available choices: mixed, passive, aggressive 
    -P, --passwords FILE-PATH                     List of passwords to use during the password attack. 
                                                  If no --username/s option supplied, user enumeration will be run. 
    -U, --usernames LIST                          List of usernames to use during the password attack. 
                                                  Examples: 'a1', 'a1,a2,a3', '/tmp/a.txt' 
        --multicall-max-passwords MAX_PWD         Maximum number of passwords to send by request with XMLRPC multicall 
                                                  Default: 500 
        --password-attack ATTACK                  Force the supplied attack to be used rather than automatically determining one. 
                                                  Available choices: wp-login, xmlrpc, xmlrpc-multicall 
        --login-uri URI                           The URI of the login page if different from /wp-login.php 
        --stealthy                                Alias for --random-user-agent --detection-mode passive --plugins-version-detection passive 

[!] To see full list of options use --hh. 

Copied to clipboard