WP pentesting - muhammeddardir/wordpress-pentesting GitHub Wiki

Important Paths

  • /wp-content/uploads/2018/08/a.txt : where Uploaded files
  • /wp-content/themes/twentytwelve/404.php: Themes files can be found here
  • /wp-json/wp/v2/pages:could leak IP addresses
  • /wp-json/oembed/1.0/proxy?url=burpcollaborator: May be Find SSRF

Important Directories and Files

  • wp-config.php : you can find the root password of the database
  • wp-content : Folder is the main directory where plugins and themes are stored
  • wp-activate.php : Email activation process,when setting up a new WordPress
  • xmlrpc.php : Feature that enables data to be transmitted with HTTP
  • license.txt : information such as the version WordPress
  • /readme.html
  • wp-includes/ : stored Core Files such as certificates, fonts, JS files, and widgets.
  • Login folders

    • /wp-admin/login.php
    • /wp-admin/wp-login.php
    • /login.php
    • /wp-login.php

Passive Enumeration

Get WordPress version

  • Check if you can find the files /license.txt or /readme.html
  • source code meta name
  • CSS link files
  • JavaScript files

Active Enumeration

  • Plugins and Themes
  • Users
    • ID Brute : curl -s -I -X GET http://blog.example.com/?author=1 if 200,30X, that means that the id is valid.
    • wp-json : /wp-json/wp/v2/users
    • login user Enum
    • WPScan Auto
  • XML-RPC
    • If xml-rpc.php is active you can perform a credentials brute-force or use it to launch DoS attacks to other resources wpxploit
    • We Can Extract Perform Attacks
      • listMethods
      • Credentials Bruteforce
      • Bypass 2FA
      • port scanning

Common WordPress security issues & malpractices

  • Outdated versions : <meta name=”generator” content=”WordPress 4.8.11″ />
  • Outdated versions themes and plugins : WPScan use Vulnerability Database_ API key
  • Old versions of PHP and web servers curl -s -D – http://example.com/ -o /dev/null | grep -i "Server\|X-Powered-By"
  • Missing Rate limite
  • Web server misconfiguration
    • Directory listing /wp-content/themes/twentyseventeen/assets
    • Backup files http://www.example.com/wp-config.php.bak
    • Temporary files : vim ext wp-config.php.ext~ Accessible in plain text
    • Exposed MySQL : shodan product: MySql

Automatic Tools

Pentesting Report

Wordpress Security

Resources