mirror of
https://github.com/ivuorinen/cheatsheet-tldr.git
synced 2026-03-19 00:01:18 +00:00
Move pages under tldr, lint run.sh, update docs
This commit is contained in:
41
tldr/wpscan
Normal file
41
tldr/wpscan
Normal file
@@ -0,0 +1,41 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, common]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# wpscan
|
||||
|
||||
> WordPress vulnerability scanner.
|
||||
> More information: <https://github.com/wpscanteam/wpscan>.
|
||||
|
||||
- Update the vulnerability database:
|
||||
|
||||
`wpscan --update`
|
||||
|
||||
- Scan a WordPress website:
|
||||
|
||||
`wpscan --url {{url}}`
|
||||
|
||||
- Scan a WordPress website, using random user agents and passive detection:
|
||||
|
||||
`wpscan --url {{url}} --stealthy`
|
||||
|
||||
- Scan a WordPress website, checking for vulnerable plugins and specifying the path to the `wp-content` directory:
|
||||
|
||||
`wpscan --url {{url}} --enumerate {{vp}} --wp-content-dir {{remote/path/to/wp-content}}`
|
||||
|
||||
- Scan a WordPress website through a proxy:
|
||||
|
||||
`wpscan --url {{url}} --proxy {{protocol://ip:port}} --proxy-auth {{username:password}}`
|
||||
|
||||
- Perform user identifiers enumeration on a WordPress website:
|
||||
|
||||
`wpscan --url {{url}} --enumerate {{u}}`
|
||||
|
||||
- Execute a password guessing attack on a WordPress website:
|
||||
|
||||
`wpscan --url {{url}} --usernames {{username|path/to/usernames.txt}} --passwords {{path/to/passwords.txt}} threads {{20}}`
|
||||
|
||||
- Scan a WordPress website, collecting vulnerability data from the WPVulnDB (<https://wpvulndb.com/>):
|
||||
|
||||
`wpscan --url {{url}} --api-token {{token}}`
|
||||
Reference in New Issue
Block a user