Wprecon : A Vulnerability Recognition Tool In CMS WordPress

Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go.

Features

StatusFeatures
Random Agent
Detection WAF
User Enumerator
Plugin Scanner
Theme Scanner
Tor Proxy’s
Detection Honeypot
Fuzzing Backup Files
🔨Fuzzing Passwords
🔨Vulnerability Scanner

Usage

Flag(s)Description
-u, –url stringTarget URL (Ex: http(s)://example.com/). (Required)
–users-enumerateUse the supplied mode to enumerate Users.
–themes-enumerateUse the supplied mode to enumerate Themes.
–plugins-enumerateUse the supplied mode to enumerate Plugins.
–detection-wafI will try to detect if the target is using any WAF.
–detection-honeypotI will try to detect if the target is a honeypot, based on the shodan.
–no-check-wpWill skip wordpress check on target.
–random-agentUse randomly selected HTTP(S) User-Agent header value.
–torUse Tor anonymity network.
–disable-tls-checksDisables SSL/TLS certificate verification.
-h, –helphelp for wprecon.
-v, –verboseVerbosity mode.

WPrecon Running

Command: wprecon --url "https://www.xxxxxxx.com/" --detection-waf

  • Output:
—————————————————————————————————————————————————————————————————————

___       ______________________________________________   __
__ |     / /__  __ \__  __ \__  ____/_  ____/_  __ \__  | / /
__ | /| / /__  /_/ /_  /_/ /_  __/  _  /    _  / / /_   |/ /
__ |/ |/ / _  ____/_  _, _/_  /___  / /___  / /_/ /_  /|  /
____/|__/  /_/     /_/ |_| /_____/  \____/  \____/ /_/ |_/

Github: https://github.com/blackcrw/wprecon
Version: 0.0.1a
—————————————————————————————————————————————————————————————————————
[•] Target: https://www.xxxxxxx.com/
[•] Starting: 09/jan/2020 12:11:17

[•] Listing enable: https://www.xxxxxxx.com/wp-content/plugins/
[•] Listing enable: https://www.xxxxxxx.com/wp-content/themes/
[•••] Status Code: 200 — URL: https://www.xxxxxxx.com/wp-admin/
[•••] I'm not absolutely sure that this target is using wordpress! 37.50% chance. do you wish to continue ? [Y/n]: Y
[•••] Status Code: 200 — WAF: Wordfence Security Detected
[•••] Do you wish to continue ?! [Y/n] : Y
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago