Detect XML Pingback URL
This commit is contained in:
@@ -178,4 +178,21 @@ class WpTarget
|
|||||||
end
|
end
|
||||||
@multisite
|
@multisite
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def xml_rpc_url
|
||||||
|
unless @xmlrpc_url
|
||||||
|
headers = Browser.instance.get(@uri).headers_hash
|
||||||
|
value = headers["x-pingback"]
|
||||||
|
if value.nil? or value.empty?
|
||||||
|
@xmlrpc_url = "nope"
|
||||||
|
else
|
||||||
|
@xmlrpc_url = value
|
||||||
|
end
|
||||||
|
end
|
||||||
|
@xmlrpc_url
|
||||||
|
end
|
||||||
|
|
||||||
|
def xml_rpc_enabled
|
||||||
|
xml_rpc_url != "nope"
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -144,6 +144,10 @@ begin
|
|||||||
puts green("[+]") + " User registration is enabled"
|
puts green("[+]") + " User registration is enabled"
|
||||||
end
|
end
|
||||||
|
|
||||||
|
if wp_target.xml_rpc_enabled
|
||||||
|
puts green("[+]") + " XML-RPC Interface available under #{wp_target.xml_rpc_url}"
|
||||||
|
end
|
||||||
|
|
||||||
if wp_target.has_malwares?
|
if wp_target.has_malwares?
|
||||||
malwares = wp_target.malwares
|
malwares = wp_target.malwares
|
||||||
puts red("[!]") + " #{malwares.size} malware(s) found :"
|
puts red("[!]") + " #{malwares.size} malware(s) found :"
|
||||||
|
|||||||
Reference in New Issue
Block a user