diff --git a/index.html b/index.html
index f5da412b..76b456f6 100644
--- a/index.html
+++ b/index.html
@@ -56,257 +56,30 @@
Prerequisites: Installing on Debian/Ubuntu: Before Ubuntu 14.04: From Ubuntu 14.04: Installing on Fedora: Installing on Archlinux: Installing on Mac OSX: Installing with RVM:
- Typhoeus segmentation fault
- Update curl to at least v7.21 (may have to install from source)
- See http://code.google.com/p/wpscan/issues/detail?id=81
-
- Proxy not working
- Update cURL to version => 7.21.7 (may have to install from source).
INSTALL
+
-
+
-
-
-sudo apt-get install libcurl4-gnutls-dev libopenssl-ruby libxml2 libxml2-dev libxslt1-dev ruby-devsudo apt-get install libcurl4-gnutls-dev libxml2 libxml2-dev libxslt1-dev ruby-devgit clone https://github.com/wpscanteam/wpscan.gitcd wpscansudo gem install bundler && bundle install --without test developmentsudo yum install gcc ruby-devel libxml2 libxml2-devel libxslt libxslt-devel libcurl-develgit clone https://github.com/wpscanteam/wpscan.gitcd wpscansudo gem install bundler && bundle install --without test developmentpacman -Syu rubypacman -Syu libyamlgit clone https://github.com/wpscanteam/wpscan.gitcd wpscansudo gem install bundler && bundle install --without test developmentgem install typhoeusgem install nokogirigit clone https://github.com/wpscanteam/wpscan.gitcd wpscansudo gem install bundler && bundle install --without test developmentcd ~curl -sSL https://get.rvm.io | bash -s stablesource ~/.rvm/scripts/rvmecho "source ~/.rvm/scripts/rvm" >> ~/.bashrcrvm install 2.1.2rvm use 2.1.2 --defaultecho "gem: --no-ri --no-rdoc" > ~/.gemrcgit clone https://github.com/wpscanteam/wpscan.gitcd wpscangem install bundlerbundle install --without testKNOWN ISSUES
-
-
-
-
- Installation from sources :
-
-
-
cannot load such file -- readline
-Run sudo aptitude install libreadline5-dev libncurses5-dev
-Then, open the directory of readline gem (you have to locate it first)
- -
-
- cd ~/.rvm/src/ruby-1.9.2-p180/ext/readline
- ruby extconf.rb
- make
- make install
-
-
-
- See here for more details
---url | -u <target url> The WordPress URL/domain to scan.
-
---force | -f Forces WPScan to not check if the remote site is running WordPress.
-
---enumerate | -e [option(s)] Enumeration.
- option :
- u usernames from id 1 to 10
- u[10-20] usernames from id 10 to 20 (you must write [] chars)
- p plugins
- vp only vulnerable plugins
- ap all plugins (can take a long time)
- tt timthumbs
- t themes
- vt only vulnerable themes
- at all themes (can take a long time)
- Multiple values are allowed : '-e tt,p' will enumerate timthumbs and plugins
- If no option is supplied, the default is 'vt,tt,u,vp'
-
---exclude-content-based '<regexp or string>' Used with the enumeration option, will exclude all occurence based on the regexp or string supplied
- You do not need to provide the regexp delimiters, but you must write the quotes (simple or double)
-
---config-file | -c <config file> Use the specified config file
-
---follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not
-
---proxy <[protocol://]host:port> Supply a proxy (will override the one from conf/browser.conf.json).
- HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used
-
---proxy-auth <username:password> Supply the proxy login credentials (will override the one from conf/browser.conf.json).
-
---basic-auth <username:password> Set the HTTP basic authentification
-
---wordlist | -w <wordlist> Supply a wordlist for the password bruter and do the brute.
-
---threads | -t <number of threads> The number of threads to use when multi-threading requests. (will override the value from conf/browser.conf.json)
-
---username | -U <username> Only brute force the supplied username.
-
---help | -h This help screen.
-
---verbose | -v Verbose output.
-
-
-Do 'non-intrusive' checks...
- -ruby wpscan.rb --url www.example.com
Do wordlist password brute force on enumerated users using 50 threads...
- -ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --threads 50
Do wordlist password brute force on the 'admin' username only...
- -ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --username admin
Enumerate installed plugins...
- -ruby wpscan.rb --url www.example.com --enumerate p
Run all enumeration tools...
- -ruby wpscan.rb --url www.example.com --enumerate
Update WPScan...
- -ruby wpscan.rb --update
--help | -h This help screen.
---Verbose | -v Verbose output.
---update | -u Update to the latest revision.
---generate_plugin_list [number of pages] Generate a new data/plugins.txt file. (supply number of *pages* to parse, default : 150)
---gpl Alias for --generate_plugin_list
-
-
-Generate a new 'most popular' plugin list, up to 150 pages...
- -ruby wpstools.rb --generate_plugin_list 150
https://github.com/wpscanteam/wpscan
- -https://github.com/wpscanteam/wpscan/issues
- -WPScan is sponsored by the RandomStorm Open Source Initiative.
- - + +