WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping to spot the security issues.
Firstly, install WPScan!
Installation can be done through github
git clone https://github.com/wpscanteam/wpscanN
Go to the directory where you have downloaded wpscan and
install the bundle files.
bundle install && rake install
Now, we are ready to use WPScan!
wpscan –url http://target.tld –enumerate u
Use the command according to your necessity.
As in,
u= User information
p =Plugins
t=themes
This basic command will scan your website and identifies the active themes and other exposed vulnerable information
Exposed webserver type of the website
The Administrative Login page of the WordPress Site
The exposed WordPress version
Vulnerable Plugins in the website will be fetched, depicting its various categories right from the most vulnerable ones [with a red exclamation mark] upto the plugins which aren’t updated. Meaning, each and every vulnerable information will be represented.
Vulnerable themes
You can see the list of vulnerabilities identified specifically with respect to your website:
You can scan your website thoroughly to check vulnerabilities and isolate them!
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…