Updated WPScan User Documentation (markdown)

Ryan Dewhurst
2021-01-03 15:58:57 +01:00
parent 8b4a8f34c3
commit a79138c15b

@@ -116,25 +116,25 @@ Here we have put together a bunch of common commands that will help you get star
_NOTE: Get your API token from [wpscan.com](https://wpscan.com/) if you also want the vulnerabilities associated with the detected plugin displaying._
- For all plugins with known vulnerabilities:
#### For all plugins with known vulnerabilities:
`wpscan --url example.com -e vp --plugins-detection mixed --api-token YOUR_TOKEN`
- For all plugins in our database (could take a very long time):
#### For all plugins in our database (could take a very long time):
`wpscan --url example.com -e ap --plugins-detection mixed --api-token YOUR_TOKEN`
- Password brute force attack
#### Password brute force attack
`wpscan --url example.com -e u --passwords /path/to/password_file.txt`
### Docker Cheat Sheet
- Pull the Docker repository
#### Pull the Docker repository
`docker pull wpscanteam/wpscan`
- Run WPScan and enumerate usernames
#### Run WPScan and enumerate usernames
`docker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u`
@@ -147,7 +147,7 @@ docker run --rm --mount type=bind,source=$HOME/docker-bind,target=/output wpscan
The `wpscan-output.txt` file now exists on the host machine at `~/docker-bind/wpscan-output.txt`.
- Pass password list to Docker container
#### Pass password list to Docker container
```
docker run -it --rm -v /Users/__macuser__/:/__containerdirectory__ wpscanteam/wpscan --url http://example..com/ --passwords /__containerdirectory__/passwords.txt