WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping to spot the security issues.

Firstly, install WPScan!
Installation can be done through github
git clone https://github.com/wpscanteam/wpscanN
Go to the directory where you have downloaded wpscan and 
install the bundle files.
bundle install && rake install

Now, we are ready to use WPScan!
wpscan –url http://target.tld –enumerate u
Use the command according to your necessity.
As in,

u= User information
p =Plugins
t=themes

This basic command will scan your website and identifies the active themes and other exposed vulnerable information

Exposed webserver type of the website

The Administrative Login page of the WordPress Site

The exposed WordPress version

Vulnerable Plugins in the website will be fetched, depicting its various categories right from the most vulnerable ones [with a red exclamation mark] upto the plugins which aren’t updated. Meaning, each and every vulnerable information will be represented.

Vulnerable themes

You can see the list of vulnerabilities identified specifically with respect to your website:

You can scan your website thoroughly to check vulnerabilities and isolate them!

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Pricilla

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

17 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

17 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

17 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

17 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

17 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

20 hours ago