当前位置: 首页 > news >正文

柳州营销网站建设可以做旅行计划的网站

柳州营销网站建设,可以做旅行计划的网站,石狮建设银行网站,虚拟主机价格一般多少钱目录 简单介绍 暴力破解 信息收集 指定用户爆破 命令集合 简单介绍 Wordpress是一个以PHP和MySQL为平台的免费自由开源的博客软件和内容管理系统。 WPScan是Kali Linux默认自带的一款漏洞扫描工具,它采用Ruby编写,能够扫描WordPress网站中的多种安…

目录

简单介绍

暴力破解

信息收集

指定用户爆破

命令集合


简单介绍

Wordpress是一个以PHP和MySQL为平台的免费自由开源的博客软件和内容管理系统。

WPScan是Kali Linux默认自带的一款漏洞扫描工具,它采用Ruby编写,能够扫描WordPress网站中的多种安全漏洞,其中包括WordPress本身的漏洞、插件漏洞和主题漏洞。(需要自己科学上网去注册wpscan然后获取官方的api-token可以每天免费扫75次) 

测试时请本地搭建环境或者获得网站管理员的许可,任何未经许可的渗透都是违法行为。

常用参数

参数用途
–update更新
-u/–url后面加要扫描的站点
-e/–enumerate枚举
u用户名
p枚举插件
ap枚举所有插件
vp枚举有漏洞的插件
t枚举主题
at枚举所有主题
vt枚举有漏洞的主题
-w/–wordlist后面加字典
-U/–username指定用户

它会扫描给定的WordPress站点的一些信息,并且列出可能是漏洞的地方,注意这里wpscan判断是否有漏洞,是根据wordpress的版本判定的,只要你的版本低于存在漏洞的版本,那么它就认为存在漏洞。扫描的结果会显示站点的插件信息、主题信息、用户信息等

这里简单介绍参数的使用

  • 扫描主题中存在的漏洞
wpscan --url url --enumerate vt
  • 扫描插件
wpscan --url url --enumerate p

暴力破解

-P -U 后面的参数最好使用文件的绝对路径

wpscan --url url -P 密码字典 -U 用户字典

这里以本地的环境为例对user进行指定字典爆破

wpscan --url 目标url -e u -P /home/kali/top100password.txt --api-token 自己的token

Interesting Finding(s)

user

passwd

其他信息

信息收集

这里没有设置WordPress在账号未登录时禁用wp-json/wp/v2/,出现泄露信息

我们访问/wp-json/wp/v2/users
发现一个admin和moonsec

指定用户爆破

这里对上面收集到的moonsec进行爆破

wpscan --url 目标url -U moonsec -P /home/kali/top100password.txt --api-token 自己的token

命令集合

wpscan --url url --enumerate vp,vt,tt,u --api-token xxx
         __          _______   _____\ \        / /  __ \ / ____|\ \  /\  / /| |__) | (___   ___  __ _ _ __ ®\ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \\  /\  /  | |     ____) | (__| (_| | | | |\/  \/   |_|    |_____/ \___|\__,_|_| |_|WordPress Security Scanner by the WPScan TeamVersion 3.8.22Sponsored by Automattic - https://automattic.com/@_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
_______________________________________________________________[+] URL: http://www.redteam.com/ [192.168.1.12]
[+] Started: Thu Feb 16 03:50:17 2023Interesting Finding(s):[+] Headers| Interesting Entries:|  - Server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b mod_fcgid/2.3.9a mod_log_rotate/1.02|  - X-Powered-By: PHP/7.3.4| Found By: Headers (Passive Detection)| Confidence: 100%[+] robots.txt found: http://www.redteam.com/robots.txt| Interesting Entries:|  - /wp-admin/|  - /wp-admin/admin-ajax.php| Found By: Robots Txt (Aggressive Detection)| Confidence: 100%[+] XML-RPC seems to be enabled: http://www.redteam.com/xmlrpc.php| Found By: Direct Access (Aggressive Detection)| Confidence: 100%| References:|  - http://codex.wordpress.org/XML-RPC_Pingback_API|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/|  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/[+] WordPress readme found: http://www.redteam.com/readme.html| Found By: Direct Access (Aggressive Detection)| Confidence: 100%[+] The external WP-Cron seems to be enabled: http://www.redteam.com/wp-cron.php| Found By: Direct Access (Aggressive Detection)| Confidence: 60%| References:|  - https://www.iplocation.net/defend-wordpress-from-ddos|  - https://github.com/wpscanteam/wpscan/issues/1299[+] WordPress version 5.5.11 identified (Outdated, released on 2022-10-17).| Found By: Rss Generator (Passive Detection)|  - http://www.redteam.com/feed/, <generator>https://wordpress.org/?v=5.5.11</generator>|  - http://www.redteam.com/comments/feed/, <generator>https://wordpress.org/?v=5.5.11</generator>|| [!] 1 vulnerability identified:|| [!] Title: WP <= 6.1.1 - Unauthenticated Blind SSRF via DNS Rebinding|     References:|      - https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11|      - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3590|      - https://blog.sonarsource.com/wordpress-core-unauthenticated-blind-ssrf/[+] WordPress theme in use: twentytwenty| Location: http://www.redteam.com/wp-content/themes/twentytwenty/| Last Updated: 2022-11-02T00:00:00.000Z| Readme: http://www.redteam.com/wp-content/themes/twentytwenty/readme.txt| [!] The version is out of date, the latest version is 2.1| Style URL: http://www.redteam.com/wp-content/themes/twentytwenty/style.css?ver=1.5| Style Name: Twenty Twenty| Style URI: https://wordpress.org/themes/twentytwenty/| Description: Our default theme for 2020 is designed to take full advantage of the flexibility of the block editor...| Author: the WordPress team| Author URI: https://wordpress.org/|| Found By: Css Style In Homepage (Passive Detection)| Confirmed By: Css Style In 404 Page (Passive Detection)|| Version: 1.5 (80% confidence)| Found By: Style (Passive Detection)|  - http://www.redteam.com/wp-content/themes/twentytwenty/style.css?ver=1.5, Match: 'Version: 1.5'[+] Enumerating Vulnerable Plugins (via Passive Methods)[i] No plugins Found.[+] Enumerating Vulnerable Themes (via Passive and Aggressive Methods)Checking Known Locations - Time: 00:01:11 <====================================================================> (492 / 492) 100.00% Time: 00:01:11
[+] Checking Theme Versions (via Passive and Aggressive Methods)[i] No themes Found.[+] Enumerating Timthumbs (via Passive and Aggressive Methods)Checking Known Locations - Time: 00:06:12 <==================================================================> (2575 / 2575) 100.00% Time: 00:06:12[i] No Timthumbs Found.[+] Enumerating Users (via Passive and Aggressive Methods)Brute Forcing Author IDs - Time: 00:00:02 <======================================================================> (10 / 10) 100.00% Time: 00:00:02[i] User(s) Identified:[+] moonsec| Found By: Author Posts - Author Pattern (Passive Detection)| Confirmed By:|  Rss Generator (Passive Detection)|  Wp Json Api (Aggressive Detection)|   - http://www.redteam.com/wp-json/wp/v2/users/?per_page=100&page=1|  Rss Generator (Aggressive Detection)|  Author Sitemap (Aggressive Detection)|   - http://www.redteam.com/wp-sitemap-users-1.xml|  Author Id Brute Forcing - Author Pattern (Aggressive Detection)[+] admin| Found By: Author Posts - Author Pattern (Passive Detection)| Confirmed By:|  Rss Generator (Passive Detection)|  Wp Json Api (Aggressive Detection)|   - http://www.redteam.com/wp-json/wp/v2/users/?per_page=100&page=1|  Rss Generator (Aggressive Detection)|  Author Sitemap (Aggressive Detection)|   - http://www.redteam.com/wp-sitemap-users-1.xml|  Author Id Brute Forcing - Author Pattern (Aggressive Detection)[+] WPScan DB API OK| Plan: free| Requests Done (during the scan): 2| Requests Remaining: 67[+] Finished: Thu Feb 16 03:57:55 2023
[+] Requests Done: 3123
[+] Cached Requests: 12
[+] Data Sent: 880.75 KB
[+] Data Received: 1.483 MB
[+] Memory used: 297.234 MB
[+] Elapsed time: 00:07:38
http://www.yayakq.cn/news/124749/

相关文章:

  • 网站内容与标题的区别苏州那里可以建网站
  • 网站项目需求说明书psd wordpress
  • 国家网站icp备案查询如何做做网站
  • 专业网站建设设计公司网页设计学习心得
  • 网站建设作业百度云资源网站默认网站名
  • 网站制作代理品牌策划论文
  • app动效网站crm客户管理系统
  • 网站建设心得小结网址大全免费网站
  • 朔州市建设监理公司网站武进网站建设基本流程
  • 浙江住房和城乡建设网站有源码怎么做网站
  • 网站建设仟首选金手指我的网站模板下载不了
  • 搜狐一开始把网站当做什么来做手机网站制作代码
  • 福建漳州网站建设公司app制作免费
  • 国际商务网站网站登录界面模板
  • 七星彩网站开发公司产业协会建设网站方案
  • 企业网站建设服务微信头像logo在线制作
  • 做个网站需要什么步骤廊坊网站建设服务
  • html静态页面云南官网优化
  • 网站专栏怎么做漂亮重庆工程招投标交易信息网
  • 宁远县做网站的想做个赚钱的网站不知道做那种
  • 顺德网站制作案例如何唐山中企动力做网站
  • 青海省建设厅网站首页仓库管理系统软件
  • flash型网站网址php网页开发
  • 平台式网站模板下载地址深圳定制礼品杯
  • 网站培训班有哪些课程内网网站建设汇报
  • 西安制作网站公司哪家好网页制作基础教程直播
  • 专业网站定制平台百度指数搜索热度大学
  • 网站后台制作北京的电商平台网站
  • 校体育网站建设的好处唐山哪里有建设网站
  • 中国移动门户网站用ps如何做短视频网站