Wordpress Attacks
Discovery/Footprinting
Look into /robots.txt
User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
Disallow: /wp-content/uploads/wpforms/
Sitemap: https://inlanefreight.local/wp-sitemap.xmlpresence of the
/wp-adminand/wp-contentdirectories
Enumeration
curl -s https://blog.inlanefreight.local | grep WordPress<meta name="generator" content="WordPress 5.8" /themes
curl -s https://wehost.co.in/ | grep themesplugins
curl -s https://wehost.co.in/ | grep pluginsEnumerating Users
login page can be found at
/wp-login.php.A valid username and an invalid password results in the following message:

an invalid username returns that the user was not found.

WPScan
Attacking WordPress
Login Bruteforce
The
wp-loginmethod will attempt to brute force the standard WordPress login page, while thexmlrpcmethod uses WordPress API to make login attempts through/xmlrpc.php.The
xmlrpcmethod is preferred as it’s faster.
Code Execution

PHP Meterpreter shell
Last updated