![alt text](http://dvwa.co.uk/images/wpscan_logo_407x80.png "WPScan - WordPress Security Scanner") #### LICENSE WPScan - WordPress Security Scanner Copyright (C), 2011-2012 Ryan Dewhurst AKA ethicalhack3r This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . ryandewhurst at gmail #### INSTALL WPScan comes pre-installed on the following Linux distributions: - [BackTrack Linux](http://www.backtrack-linux.org/) since version 5 R1 in the /pentest/web/wpscan/ directory. - [SamuraiWTF](http://samurai.inguardians.com/) - [BackBox Linux](http://www.backbox.org/) - [Pentoo](http://www.pentoo.ch/) WPScan only supports Ruby => 1.9. *Installing on Debian/Ubuntu:* ```sudo apt-get install libcurl4-gnutls-dev libopenssl-ruby``` ``` sudo gem install typhoeus nokogiri json``` *Installing on other nix:* (not tested) ```sudo gem install typhoeus nokogiri json``` *Installing on Mac OSX:* ```sudo gem install typhoeus nokogiri json``` #### KNOWN ISSUES - Typhoeus segmentation fault Update curl to at least v7.21 (you may have to install it from sources) See http://code.google.com/p/wpscan/issues/detail?id=81 - If you have one the following errors : "-bash: !t: event not found", "-bash: !u: event not found" It happens with enumeration : just put the 't' or 'u' before the 'p!' : '-e tp!' instead of '-e p!t' #### WPSCAN ARGUMENTS --update Update to the latest revision --url | -u The WordPress URL/domain to scan. --force | -f Forces WPScan to not check if the remote site is running WordPress. --enumerate | -e [option(s)] Enumeration. option : u usernames from id 1 to 10 u[10-20] usernames from id 10 to 20 (you must write [] chars) p plugins p! only vulnerable plugins t timthumbs Multiple values are allowed : '-e tp' will enumerate timthumbs and plugins If no option is supplied, the default is 'tup!' --follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not --wp-content-dir WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specified it. Subdirectories are allowed --wp-plugins-dir Same thing than --wp-content-dir but for the plugins directory. If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed --proxy Supply a proxy in the format host:port or protocol://host:port (will override the one from conf/browser.conf.json). HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used --wordlist | -w Supply a wordlist for the password bruter and do the brute. --threads | -t The number of threads to use when multi-threading requests. (will override the value from conf/browser.conf.json) --username | -U Only brute force the supplied username. --help | -h This help screen. --verbose | -v Verbose output. #### WPSCAN EXAMPLES Do 'non-intrusive' checks... ```ruby wpscan.rb --url www.example.com``` Do wordlist password brute force on enumerated users using 50 threads... ```ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --threads 50``` Do wordlist password brute force on the 'admin' username only... ```ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --username admin``` Enumerate installed plugins... ```ruby wpscan.rb --url www.example.com --enumerate p``` Run all enumeration tools... ```ruby wpscan.rb --url www.example.com --enumerate``` Use custom content directory... ```ruby wpscan.rb -u www.example.com --wp-content-dir custom-content``` Update... ```ruby wpscan.rb --update``` #### WPSTOOLS ARGUMENTS --help | -h This help screen. --Verbose | -v Verbose output. --update | -u Update to the latest revision. --generate_plugin_list [number of pages] Generate a new data/plugins.txt file. (supply number of *pages* to parse, default : 150) --gpl Alias for --generate_plugin_list #### WPSTOOLS EXAMPLES Generate a new 'most popular' plugin list, up to 150 pages... ```ruby wpstools.rb --generate_plugin_list 150``` #### PROJECT HOME www.wpscan.org #### GIT REPOSITORY https://github.com/wpscanteam/wpscan #### ISSUES https://github.com/wpscanteam/wpscan/issues #### SPONSOR WPScan is sponsored by the [RandomStorm](http://www.randomstorm.com) Open Source Initiative.