Updated WPScan User Documentation (markdown)
@@ -116,25 +116,25 @@ Here we have put together a bunch of common commands that will help you get star
|
||||
|
||||
_NOTE: Get your API token from [wpscan.com](https://wpscan.com/) if you also want the vulnerabilities associated with the detected plugin displaying._
|
||||
|
||||
- For all plugins with known vulnerabilities:
|
||||
#### For all plugins with known vulnerabilities:
|
||||
|
||||
`wpscan --url example.com -e vp --plugins-detection mixed --api-token YOUR_TOKEN`
|
||||
|
||||
- For all plugins in our database (could take a very long time):
|
||||
#### For all plugins in our database (could take a very long time):
|
||||
|
||||
`wpscan --url example.com -e ap --plugins-detection mixed --api-token YOUR_TOKEN`
|
||||
|
||||
- Password brute force attack
|
||||
#### Password brute force attack
|
||||
|
||||
`wpscan --url example.com -e u --passwords /path/to/password_file.txt`
|
||||
|
||||
### Docker Cheat Sheet
|
||||
|
||||
- Pull the Docker repository
|
||||
#### Pull the Docker repository
|
||||
|
||||
`docker pull wpscanteam/wpscan`
|
||||
|
||||
- Run WPScan and enumerate usernames
|
||||
#### Run WPScan and enumerate usernames
|
||||
|
||||
`docker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u`
|
||||
|
||||
@@ -147,7 +147,7 @@ docker run --rm --mount type=bind,source=$HOME/docker-bind,target=/output wpscan
|
||||
|
||||
The `wpscan-output.txt` file now exists on the host machine at `~/docker-bind/wpscan-output.txt`.
|
||||
|
||||
- Pass password list to Docker container
|
||||
#### Pass password list to Docker container
|
||||
|
||||
```
|
||||
docker run -it --rm -v /Users/__macuser__/:/__containerdirectory__ wpscanteam/wpscan --url http://example..com/ --passwords /__containerdirectory__/passwords.txt
|
||||
|
||||
Reference in New Issue
Block a user