You know that more than 60% of all the website on the internet are powered by WordPress and still growing. In a blog or website that is created with WordPress then the webmaster or admin of that blog is responsible for the security. Here in this post we will bruteforce the WordPress admin password using a tool called WPScan. Actually this tool is created for Scanning WordPress vulnerability. I am currently using kali linux Operating system.
What is WPScan
It is a tool sponsored by Sucuri. Main purpose of this tool is to scan wordpress vulnerabilities. We can use this tool to scan our site and fix any security issues.WPSCAN COMMANDS
--update Update the database to the latest version. --url | -u <target url> The WordPress URL/domain to scan. --force | -f Forces WPScan to not check if the remote site is running WordPress. --enumerate | -e [option(s)] Enumeration. option : u usernames from id 1 to 10 u[10-20] usernames from id 10 to 20 (you must write [] chars) p plugins vp only vulnerable plugins ap all plugins (can take a long time) tt timthumbs t themes vt only vulnerable themes at all themes (can take a long time) Multiple values are allowed : "-e tt,p" will enumerate timthumbs and plugins If no option is supplied, the default is "vt,tt,u,vp"
--exclude-content-based "<regexp or string>" Used with the enumeration option, will exclude all occurrences based on the regexp or string supplied. You do not need to provide the regexp delimiters, but you must write the quotes (simple or double). --config-file | -c <config file> Use the specified config file, see the example.conf.json. --user-agent | -a <User-Agent> Use the specified User-Agent. --cookie <String> String to read cookies from. --random-agent | -r Use a random User-Agent. --follow-redirection If the target url has a redirection, it will be followed without asking if you wanted to do so or not --batch Never ask for user input, use the default behaviour. --no-color Do not use colors in the output. --wp-content-dir <wp content dir> WPScan try to find the content directory (ie wp-content) by scanning the index page, however you can specified it. Subdirectories are allowed. --wp-plugins-dir <wp plugins dir> Same thing than --wp-content-dir but for the plugins directory. If not supplied, WPScan will use wp-content-dir/plugins. Subdirectories are allowed --proxy <[protocol://]host:port> Supply a proxy. HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given (format host:port), HTTP will be used. --proxy-auth <username:password> Supply the proxy login credentials. --basic-auth <username:password> Set the HTTP Basic authentication. --wordlist | -w <wordlist> Supply a wordlist for the password brute forcer. --username | -U <username> Only brute force the supplied username. --usernames <path-to-file> Only brute force the usernames from the file. --threads | -t <number of threads> The number of threads to use when multi-threading requests. --cache-ttl <cache-ttl> Typhoeus cache TTL. --request-timeout <request-timeout> Request Timeout. --connect-timeout <connect-timeout> Connect Timeout. --max-threads <max-threads> Maximum Threads. --throttle <milliseconds> Milliseconds to wait before doing another web request. If used, the --threads should be set to 1. --help | -h This help screen. --verbose | -v Verbose output. --version Output the current version and exit.
Steps to Hack Wordpress admin Password using WPScan
First Open Terminal in Kali Linux
Updating WPScan Vulnerabilities database
wpscan –update
Scanning for WordPress vulnerabilities
wpscan –url [wordpress url]
replace [wordpress url] with the wordpress blog or website url
Now Let's Enumerate WordPress User
wpscan –url [wordpress url] –enumerate u
How to brute force wordpress admin root password
First you need a good word list to bruteforce the admin password using wpscan in Kali linux. I will recommend you to use RockYou.txt
Brute Forcing Admin Password
wpscan –url [wordpress url] –wordlist [path to wordlist] –username [username to brute force] –threads [number of threads to use]
That's All, Now wait until you successfully hacked the wordpress admin password.I will highly recommend you to use kali linux for pen testing. If you have any doubt fell free to comment.
No comments:
Post a Comment