From 8b4a8f34c3d31a4c233fb4dd4052822738c1dde4 Mon Sep 17 00:00:00 2001 From: Ryan Dewhurst Date: Sun, 3 Jan 2021 15:57:14 +0100 Subject: [PATCH] Updated WPScan User Documentation (markdown) --- WPScan-User-Documentation.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/WPScan-User-Documentation.md b/WPScan-User-Documentation.md index 88938b4..44575b0 100644 --- a/WPScan-User-Documentation.md +++ b/WPScan-User-Documentation.md @@ -147,6 +147,14 @@ docker run --rm --mount type=bind,source=$HOME/docker-bind,target=/output wpscan The `wpscan-output.txt` file now exists on the host machine at `~/docker-bind/wpscan-output.txt`. +- Pass password list to Docker container + +``` +docker run -it --rm -v /Users/__macuser__/:/__containerdirectory__ wpscanteam/wpscan --url http://example..com/ --passwords /__containerdirectory__/passwords.txt +``` + +See: https://github.com/wpscanteam/wpscan/issues/1256#issuecomment-609055053 + ## Vulnerability Database WPScan uses the [WordPress Vulnerability Database](https://wpscan.com/api) API in real time to retrieve known vulnerabilities that affect WordPress core, plugins and themes.