wordpress程序在全球使用率很高自然少不了黑客们入侵的目标,也随之出现针对入侵wordpress的利用工具。
这里介绍一个专门检测wordpress漏洞的利用工具wpscan。
以下是使用的数据记录:
经验心得如下!
这个工具无法直接用命令,需要进入到usr/bin文件夹中运行!
第一步,打开终端
输入cd /usr/bin
第二步,运行wpscan
在usr/bin 终端中输入命令。 wpscan -h
Help :
Some values are settable in conf/browser.conf.json :
user-agent, proxy, proxy-auth, threads, cache timeout and request timeout
–update Update to the latest revision
–url | -u
–force | -f Forces WPScan to not check if the remote site is running WordPress.
–enumerate | -e [option(s)] Enumeration.
option :
u usernames from id 1 to 10
u[10-20] usernames from id 10 to 20 (you must write [] chars)
p plugins
vp only vulnerable plugins
ap all plugins (can take a long time)
tt timthumbs
t themes
vt only vulnerable themes
at all themes (can take a long time)
Multiple values are allowed : ‘-e t,p’ will enumerate timthumbs and plugins
If no option is supplied, the default is ‘vt,tt,u,vp’
–exclude-content-based ‘
You do not need to provide the regexp delimiters, but you must write the quotes (simple or double)
–config-file | -c
–follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not
–wp-content-dir
–wp-plugins-dir
–proxy <[protocol://]host:port> Supply a proxy (will override the one from conf/browser.conf.json).
HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used
–proxy-auth
–basic-auth
–wordlist | -w
–threads | -t
–username | -U
–help | -h This help screen.
–verbose | -v Verbose output.
Examples :
-Further help …
ruby /usr/bin/wpscan –help
-Do ‘non-intrusive’ checks …
ruby /usr/bin/wpscan –url www.example.com
-Do wordlist password brute force on enumerated users using 50 threads …
ruby /usr/bin/wpscan –url www.example.com –wordlist darkc0de.lst –threads 50
-Do wordlist password brute force on the ‘admin’ username only …
ruby /usr/bin/wpscan –url www.example.com –wordlist darkc0de.lst –username admin
-Enumerate installed plugins …
ruby /usr/bin/wpscan –url www.example.com –enumerate p
-Enumerate installed themes …
ruby /usr/bin/wpscan –url www.example.com –enumerate t
-Enumerate users …
ruby /usr/bin/wpscan –url www.example.com –enumerate u
-Enumerate installed timthumbs …
ruby /usr/bin/wpscan –url www.example.com –enumerate tt
-Use a HTTP proxy …
ruby /usr/bin/wpscan –url www.example.com –proxy 127.0.0.1:8118
-Use a SOCKS5 proxy … (cURL >= v7.21.7 needed)
ruby /usr/bin/wpscan –url www.example.com –proxy socks5://127.0.0.1:9000
-Use custom content directory …
ruby /usr/bin/wpscan -u www.example.com –wp-content-dir custom-content
-Use custom plugins directory …
ruby /usr/bin/wpscan -u www.example.com –wp-plugins-dir wp-content/custom-plugins
-Update …
ruby /usr/bin/wpscan –update
See README for further information.
选项过多,不一一解释。 挑选几个常用的命令
wpscan –url http://testurl/ 检测常用插件
wpscan –url http://testurl/ -e 全面检测
wpscan –url http://testurl/ -e u 检测用户
wpscan –url http://testurl/ –wordlist 字典(如果下载到桌面,则是/root/Desktop/字典.txt) –username admin (这里填写之间检测到的用户) 暴力PJ密码!
全面检测中会检测到一些XSS或者SQL注射类的漏洞,会用红色的字体显示,并有漏洞详细信息的链接!
其他的功能大家慢慢发觉! 搞wordpress 非常有用的工具!