githubEdit

enumeration

1. Basic WordPress Identification

Perform initial checks to confirm if a website is running WordPress.

curl -s http://blog.inlanefreight.local/robots.txt  # Check for disallowed paths
curl -s http://blog.inlanefreight.local/wp-admin/  # Observe redirection behavior
curl -s http://blog.inlanefreight.local/wp-content/plugins/  # Check for plugin directory
curl -s http://blog.inlanefreight.local/wp-content/themes/  # Check for theme directory

2. WordPress Version and Theme Enumeration

Identify the WordPress version and active themes.

curl -s http://blog.inlanefreight.local | grep -i "WordPress"  # Check for version details
curl -s http://blog.inlanefreight.local/ | grep -i "themes"  # Identify themes
curl -s http://blog.inlanefreight.local/wp-content/themes/transport-gravity/style.css  # Check theme stylesheet
curl -s http://blog.inlanefreight.local/wp-content/themes/transport-gravity/readme.txt  # Check theme readme

3. Plugin Enumeration

Discover installed plugins which may have known vulnerabilities.

curl -s http://blog.inlanefreight.local/ | grep -i "plugins"
curl -s http://blog.inlanefreight.local/wp-content/plugins/mail-masta/readme.txt  # Check for version info
curl -s http://blog.inlanefreight.local/?p=1 | grep -i "plugins"  # Look for references in page content

4. User Enumeration (Manual)

Detect valid usernames using login response differences.

5. WPScan Enumeration

Use WPScan for automated WordPress enumeration.

WPScan Advanced Enumeration

WPScan Brute-force Attack

WPScan with Proxy

6. XML-RPC Checks

Check if XML-RPC is enabled, which can be exploited for brute-force attacks.

XML-RPC Exploitation

Check if system.multicall can be used for brute-force attacks.

7. Additional Security Checks

Robots.txt Insights

Identify restricted areas and test for misconfigurations.

Test if restricted files are still accessible:

Page Source Analysis

Extract useful information such as API keys and endpoints.

Detect Open Directory Listings

Last updated