. 环境要求

Prerequisites:

  • Ruby >= 1.9.2 – Recommended: 2.2.1
  • Curl >= 7.21 – Recommended: latest – FYI the 7.29 has a segfault
  • RubyGems – Recommended: latest
  • Git

Windows is not supported. If installed from Github update the code base with git pull. The databases are updated with wpscan.rb –update.

. 各系统安装

Installing on Ubuntu:

Before Ubuntu 14.04:

sudo apt-get install libcurl4-gnutls-dev libopenssl-ruby libxml2 libxml2-dev libxslt1-dev ruby-dev

git clone https://github.com/wpscanteam/wpscan.git

cd wpscan

sudo gem install bundler && bundle install –without test

From Ubuntu 14.04:

sudo apt-get install libcurl4-gnutls-dev libxml2 libxml2-dev libxslt1-dev ruby-dev build-essential

git clone https://github.com/wpscanteam/wpscan.git

cd wpscan

sudo gem install bundler && bundle install –without test

Installing on Debian:

sudo apt-get install git ruby ruby-dev libcurl4-gnutls-dev make

git clone https://github.com/wpscanteam/wpscan.git

cd wpscan

sudo gem install bundler

bundle install –without test –path vendor/bundle

Installing on Fedora:

sudo yum install gcc ruby-devel libxml2 libxml2-devel libxslt libxslt-devel libcurl-devel patch

git clone https://github.com/wpscanteam/wpscan.git

cd wpscan

sudo gem install bundler && bundle install –without test

.使用方法

WPSCAN ARGUMENTS

–update   Update the databases.

–url   | -u <target url>  The WordPress URL/domain to scan.

–force | -f Forces WPScan to not check if the remote site is running WordPress.

–enumerate | -e [option(s)]  Enumeration.

option :

u        usernames from id 1 to 10

u[10-20] usernames from id 10 to 20 (you must write [] chars)

p        plugins

vp       only vulnerable plugins

ap       all plugins (can take a long time)

tt       timthumbs

t        themes

vt       only vulnerable themes

at       all themes (can take a long time)

Multiple values are allowed : “-e tt,p” will enumerate timthumbs and plugins

If no option is supplied, the default is “vt,tt,u,vp”

–exclude-content-based “<regexp or string>” Used with the enumeration option, will exclude all occurrences based on the regexp or string supplied

You do not need to provide the regexp delimiters, but you must write the quotes (simple or double)

–config-file | -c <config file> Use the specified config file, see the example.conf.json

–user-agent | -a <User-Agent> Use the specified User-Agent

–random-agent | -r Use a random User-Agent

–follow-redirection  If the target url has a redirection, it will be followed without asking if you wanted to do so or not

–wp-content-dir <wp content dir>  WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specified it. Subdirectories are allowed

–wp-plugins-dir <wp plugins dir>  Same thing than –wp-content-dir but for the plugins directory. If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed

–proxy <[protocol://]host:port> Supply a proxy (will override the one from conf/browser.conf.json).

HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used

–proxy-auth <username:password>  Supply the proxy login credentials.

–basic-auth <username:password>  Set the HTTP Basic authentication.

–wordlist | -w <wordlist>  Supply a wordlist for the password brute forcer.

–threads  | -t <number of threads>  The number of threads to use when multi-threading requests.

–username | -U <username>  Only brute force the supplied username.

–usernames  <path-to-file>  Only brute force the usernames from the file.

–cache-ttl <cache-ttl>  Typhoeus cache TTL.

–request-timeout <request-timeout>  Request Timeout.

–connect-timeout <connect-timeout>  Connect Timeout.

–max-threads <max-threads>  Maximum Threads.

–help     | -h This help screen.

–verbose  | -v Verbose output.

–batch Never ask for user input, use the default behavior.

–no-color Do not use colors in the output.

–log Save STDOUT to log.txt

简单用法:

wpscan –url www.mrliangqi.com –enumerate p #扫描插件基本信息

wpscan –url www.mrlianqgi.com –enumerate vp #扫描容易受攻击的插件

wpscan –url www.mrliangqi.com –enumerate ap #扫描所有插件

wpscan –url www.mrliangqi.com –enumerate u #扫描后台用户

[+] Enumerating usernames …
[+] Identified the following 3 user/s:
+—-+———–+——+
| Id | Login     | Name |
+—-+———–+——+
| 1  | root      |      |
| 2  | fansgo123 |      |
| 3  | manning11 |      |
+—-+———–+——+

wpscan –url www.mrliangqi.com –wordlist wordlist.lst –username root #通过用户名爆破密码

发表评论

后才能评论