WPScan – Penetration Testing Tool to Find The Security Vulnerabilities in Your WordPress Websites

WPScan is a WordPress security scan for detecting and reporting WordPress vulnerabilities.

WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one of the most powerful and most used blogging tools.

As there are too many up’s and downs in WordPress usage, it requires security improvement, so WordPress Penetration testing is essential to find the vulnerabilities and secure your WordPress-powered Website.

WordPress Penetration testing with WPScan

It is a WordPress vulnerability scanner created by Ryan Dewhurst and it was sponsored by Sucuri.

It comes pre-installed with BackBox Linux, Kali Linux, Pentoo, SamuraiWTF, and BlackArch and it will not support Windows.

With this tool, we can enumerate themes, plugins, users, and HTTP proxy and will not check the source code of the page.

Installation

git clone https://github.com/wpscanteam/wpscan

cd wpscan/

bundle install && rake install

To Enumerate WordPress versions, themes and plugin

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate p wpscan –url http://tutorials.gbhackers.com/test/ –enumerate t

To Enumerate WordPress Users

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate u

To launch a brute-force attack

wpscan –url http://tutorials.gbhackers.com/test/ –wordlist /root/Desktop/password.txt –username kcwto

To Enumerate timthumbs

If you are still using TimThumb, even after a very serious vulnerability, you have one more reason to be concerned.

wpscan –url http://tutorials.gbhackers.com/test/ –enumerate tt

To store Output in a separate File

wpscan –url http://tutorials.gbhackers.com/test/ –debug-output 2>debug.log

Penetration testing is an art and the active analysis depends upon the security researcher, here we evaluated some of the basic and important checks that need to be done on the WordPress-powered website.

Disclaimer

This article with WPScan was created only for legal security testing, you should use the tool only for Testing purposes and you are not intended to use them against any unknown websites. Misuse of the information on this website can result in criminal charges brought against the persons in question. The Authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information on this website to break the law.

Also Read:

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and their…

1 hour ago

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…

14 hours ago

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…

18 hours ago

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…

18 hours ago

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…

18 hours ago

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…

21 hours ago