Update domain
@@ -108,7 +108,7 @@ If no option is supplied to the `-e` flag, then the default will be: `vp,vt,tt,c
|
||||
|
||||
Here we have put together a bunch of common commands that will help you get started quickly.
|
||||
|
||||
_NOTE: Get your API token from [wpvulndb.com](https://wpvulndb.com/) if you also want the vulnerabilities associated with the detected plugin displaying._
|
||||
_NOTE: Get your API token from [wpscan.com](https://wpscan.com/) if you also want the vulnerabilities associated with the detected plugin displaying._
|
||||
|
||||
- For all plugins with known vulnerabilities:
|
||||
|
||||
@@ -143,7 +143,7 @@ The `wpscan-output.txt` file now exists on the host machine at `~/docker-bind/wp
|
||||
|
||||
## Vulnerability Database
|
||||
|
||||
WPScan uses the [WordPress Vulnerability Database](https://wpvulndb.com/api) API in real time to retrieve known vulnerabilities that affect WordPress core, plugins and themes.
|
||||
WPScan uses the [WordPress Vulnerability Database](https://wpscan.com/api) API in real time to retrieve known vulnerabilities that affect WordPress core, plugins and themes.
|
||||
|
||||
For the vulnerability information to be shown within WPScan you will need to supply an API token with the `--api-token YOUR_TOKEN` option. Alternatively, you can supply the API token from a WPScan configuration file.
|
||||
|
||||
@@ -161,6 +161,6 @@ If WPScan is not working as expected, you can use the `--proxy` option, and use
|
||||
|
||||
## Keeping Informed
|
||||
|
||||
We blog here - [https://blog.wpscan.org/](https://blog.wpscan.org/)
|
||||
We blog here - [https://blog.wpscan.com/](https://blog.wpscan.com/)
|
||||
|
||||
We tweet here - [https://twitter.com/\_wpscan\_](https://twitter.com/\_wpscan\_)
|
||||
Reference in New Issue
Block a user