dnsercon
Man File
WPSCAN(1) User Commands WPSCAN(1)
NAME
wpscan - WordPress Security Scanner
SYNOPSIS
wpscan [options]
DESCRIPTION
WordPress Security Scanner by the WPScan Team
Sponsored by Sucuri - https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
OPTIONS
--url URL
The URL of the blog to scan Allowed Protocols: http, https Default Pro‐
tocol if none provided: http This option is mandatory unless update or
help or hh or version is/are supplied
-h, --help
Display the simple help and exit
--hh Display the full help and exit
--version
Display the version and exit
-v, --verbose
Verbose mode
--[no-]banner
Whether or not to display the banner Default: true
-o, --output FILE
Output to FILE
-f, --format FORMAT
Output results in the format supplied Available choices: cli-no-colour,
cli-no-color, json, cli
--detection-mode MODE
Default: mixed Available choices: mixed, passive, aggressive
--user-agent, --ua VALUE
--random-user-agent, --rua
Use a random user-agent for each scan
--http-auth login:password
-t, --max-threads VALUE
The max threads to use Default: 5
--throttle MilliSeconds
Milliseconds to wait before doing another web request. If used, the max
threads will be set to 1.
--request-timeout SECONDS
The request timeout in seconds Default: 60
--connect-timeout SECONDS
The connection timeout in seconds Default: 30
--disable-tls-checks
Disables SSL/TLS certificate verification
--proxy protocol://IP:port
Supported protocols depend on the cURL installed
--proxy-auth login:password
--cookie-string COOKIE
Cookie string to use in requests, format: cookie1=value1[;
cookie2=value2]
--cookie-jar FILE-PATH
File to read and write cookies Default: /tmp/wpscan/cookie_jar.txt
--force
Do not check if the target is running WordPress
--[no-]update
Whether or not to update the Database
--wp-content-dir DIR
--wp-plugins-dir DIR
-e, --enumerate [OPTS]
Enumeration Process Available Choices:
vp Vulnerable plugins
ap All plugins
p Plugins
vt Vulnerable themes
at All themes
t Themes
tt Timthumbs
cb Config backups
dbe Db exports
u User IDs range. e.g: u1-5 Range separator to use: '-' Value if no ar‐
gument supplied: 1-10
m Media IDs range. e.g m1-15 Note: Permalink setting must be set to
"Plain" for those to be detected Range separator to use: '-' Value if
no argument supplied: 1-100
Separator to use between the values: ',' Default: All Plugins, Config
Backups Value if no argument supplied: vp,vt,tt,cb,dbe,u,m Incompatible
choices (only one of each group/s can be used):
- vp, ap, p - vt, at, t
--exclude-content-based REGEXP_OR_STRING
Exclude all responses matching the Regexp (case insensitive) during
parts of the enumeration. Both the headers and body are checked. Reg‐
exp delimiters are not required.
--plugins-detection MODE
Use the supplied mode to enumerate Plugins, instead of the global
(--detection-mode) mode. Default: passive Available choices: mixed,
passive, aggressive
--plugins-version-detection MODE
Use the supplied mode to check plugins versions instead of the --detec‐
tion-mode or --plugins-detection modes. Default: mixed Available
choices: mixed, passive, aggressive
-P, --passwords FILE-PATH
List of passwords to use during the password attack. If no --user‐
name/s option supplied, user enumeration will be run.
-U, --usernames LIST
List of usernames to use during the password attack. Examples: 'a1',
'a1,a2,a3', '/tmp/a.txt'
--multicall-max-passwords MAX_PWD
Maximum number of passwords to send by request with XMLRPC multicall
Default: 500
--password-attack ATTACK
Force the supplied attack to be used rather than automatically deter‐
mining one. Available choices: wp-login, xmlrpc, xmlrpc-multicall
--stealthy
Alias for --random-user-agent --detection-mode passive --plugins-ver‐
sion-detection passive
To see full list of options use --hh.
wpscan March 2019 WPSCAN(1)
dnsercon.txt · Last modified: by hacktheplanet
