WPScan rewritten in Python + some WPSeku ideas
Go to file
dependabot[bot] a1450f2e62
Bump lxml from 4.1.0 to 4.6.2
Bumps [lxml](https://github.com/lxml/lxml) from 4.1.0 to 4.6.2.
- [Release notes](https://github.com/lxml/lxml/releases)
- [Changelog](https://github.com/lxml/lxml/blob/master/CHANGES.txt)
- [Commits](https://github.com/lxml/lxml/compare/lxml-4.1.0...lxml-4.6.2)

Signed-off-by: dependabot[bot] <support@github.com>
2021-01-07 22:19:29 +00:00
.github SPONSOR - Adding Github button 2019-07-29 18:07:58 +02:00
database BUGFIX - Updating user-agents.txt and timthubs 2018-10-09 14:09:06 +02:00
engine BUGFIX - Updating user-agents.txt and timthubs 2018-10-09 14:09:06 +02:00
fuzz BUGFIX - Thank you plugin now displayed last 2017-06-11 17:11:41 +02:00
plugins BUGFIX - Thank you plugin now displayed last 2017-06-11 17:11:41 +02:00
screens Screen updated with Themes and Plugins scans 2017-03-05 18:45:41 +01:00
tests Check isAdmin value + Docker Testing + README update 2018-07-29 18:58:46 +02:00
.gitignore Check isAdmin value + Docker Testing + README update 2018-07-29 18:58:46 +02:00
README.md Update README.md 2019-04-11 10:32:12 +02:00
requirements.txt Bump lxml from 4.1.0 to 4.6.2 2021-01-07 22:19:29 +00:00
wordpresscan.py Check isAdmin value + Docker Testing + README update 2018-07-29 18:58:46 +02:00

README.md

Wordpresscan

A simple Wordpress scanner written in python based on the work of WPScan (Ruby version), some features are inspired by WPSeku.

Disclaimer

The authors of this github are not responsible for misuse or for any damage that you may cause!
You agree that you use this software at your own risk.

Install & Launch

Install

git clone https://github.com/swisskyrepo/Wordpresscan.git
cd Wordpresscan

Virtualenv

virtualenv .venv -p /usr/bin/python2.7
source .venv/bin/activate
pip install -r requirements.txt

Examples

Example 1 : Basic update and scan of a wordpress

python wordpresscan.py -u "http://localhost/wordpress" --update --random-agent

-u : Url of the WordPress
--update : Update the wpscan database
--aggressive : Launch an aggressive version to scan for plugins/themes
--random-agent : Use a random user-agent for this session

Example 2 : Basic bruteforce (option --brute, option --nocheck)

  • bruteforce customs usernames
python wordpresscan.py -u "http://127.0.0.1/wordpress/" --brute --usernames "admin,guest" --passwords-list fuzz/wordlist.lst
  • bruteforce with usernames list
python wordpresscan.py -u "http://127.0.0.1/wordpress/" --brute --users-list fuzz/wordlist.lst --passwords-list fuzz/wordlist.lst
  • bruteforce detected users
python wordpresscan.py -u "http://127.0.0.1/wordpress/" --brute --passwords-list fuzz/wordlist.lst
╭─ 👻 swissky@crashlab: ~/Github/Wordpresscan  master*
╰─$ python main.py -u "http://127.0.0.1/wordpress/" --brute --users-list fuzz/wordlist.lst --passwords-list fuzz/wordlist.lst --nocheck       
_______________________________________________________________
 _    _               _                                         
| |  | |             | |                                        
| |  | | ___  _ __ __| |_ __  _ __ ___  ___ ___  ___ __ _ _ __  
| |/\| |/ _ \| '__/ _` | '_ \| '__/ _ \/ __/ __|/ __/ _` | '_ \
\  /\  / (_) | | | (_| | |_) | | |  __/\__ \__ \ (_| (_| | | | |
 \/  \/ \___/|_|  \__,_| .__/|_|  \___||___/___/\___\__,_|_| |_|
                       | |                                      
                       |_|                                      
 WordPress scanner based on wpscan work - @pentest_swissky      
_______________________________________________________________
[+] URL: http://127.0.0.1/wordpress/

[!] The Wordpress 'http://127.0.0.1/wordpress/readme.html' file exposing a version number: 4.4.7
[i] Uploads directory has directory listing enabled : http://127.0.0.1/wordpress/wp-content/uploads/
[i] Includes directory has directory listing enabled : http://127.0.0.1/wordpress/wp-includes/

[i] Bruteforcing all users
[+] User found admin
[+] Starting passwords bruteforce for admin
Bruteforcing - ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░

Example 3 : Thinking is overrated, this is aggressive, mostly not advised!

python wordpresscan.py -u "http://127.0.0.1/wordpress/" --fuzz

[i] Enumerating components from aggressive fuzzing ...
[i] File: http://127.0.0.1/wordpress/license.txt - found
[i] File: http://127.0.0.1/wordpress/readme.html - found
[i] File: http://127.0.0.1/wordpress/wp-admin/admin-footer.php - found
[i] File: http://127.0.0.1/wordpress/wp-admin/css/ - found
[i] File: http://127.0.0.1/wordpress/wp-admin/admin-ajax.php - found
[i] File: http://127.0.0.1/wordpress/wp-activate.php - found
--fuzz :  Will fuzz the website in order to detect as much file, themes and plugins as possible

Output example from a test environment

alt tag

Deploy a test environment

docker-compose -f wordpress_compose.yml up -d

To enable wp-json api you need to change "Permalink" to anything but "simple" in the settings.

Credits and Contributors