wpscan-loop
WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites.
Name:wpscan-loop
Category:Scanners
Publisher:trickest-mhmdiaa
Created:7/24/2023
Container:
quay.io/trickest/wpscan-loop:v3.8.24-patch-4
Output Type:
License:Unknown
Source:View Source
Parameters
The URLs of the blogs to scan. Allowed Protocols: http, https. Default Protocol if none provided: http. This option is mandatory.--force
Do not check if the target is running WordPress or returns a 403--proxy
Format: protocol://IP:port--scope
'Comma separated (sub-)domains to consider in scope. Wildcard(s) allowed in the trd of valid domains, e.g: *.target.tld. Separator to use between the values: ','--vhost
The virtual host (Host header) to use in requests--format
Output results in the format supplied. Available choices: cli, json, cli-no-colour, cli-no-color--server
Force the supplied server module to be loaded. Available choices: apache, iis, nginx--headers
Additional headers to append in requests--verbose
Verbose mode--stealthy
Alias for --random-user-agent --detection-mode passive --plugins-version-detection passive--throttle
Milliseconds to wait before doing another web request. If used, the max threads will be set to 1.--api-token
The WPScan API Token to display vulnerability data, available at https://wpscan.com/profile--cache-dir
Default: /tmp/wpscan/cache--enumerate
Enumeration Process. Available Choices: vp (Vulnerable plugins), ap (All plugins), p (Popular plugins), vt (Vulnerable themes), at (All themes), t (Popular themes), tt (Timthumbs), cb (Config backups), dbe (Db exports), u (User IDs range. e.g: u1-5. Range separator to use: '-'. Value if no argument supplied: 1-10), m (Media IDs range. e.g m1-15. Note: Permalink setting must be set to 'Plain' for those to be detected. Range separator to use: '-'. Value if no argument supplied: 1-100). Separator to use between the values: ','. Default: All Plugins, Config Backups. Value if no argument supplied: vp,vt,tt,cb,dbe,u,m.--http-auth
Format: login:password--login-uri
The URI of the login page if different from /wp-login.php--no-banner
Don't display the banner--no-update
Do not update the Database.--passwords
List of passwords to use during the password attack. If no --username/s option supplied, user enumeration will be run.--proxy-auth
Format: login:password--user-agent
User agent--clear-cache
Clear the cache before the scan--header-file
Additional headers to append in requests (one per line)--max-threads
The max threads to use. Default: 5--cookie-string
Cookie string to use in requests, format: cookie1=value1[; cookie2=value2--detection-mode
Default: mixed. Available choices: mixed, passive, aggressive--timthumbs-list
List of timthumbs' location to use--usernames
List of usernames to use during the password attack.--wp-content-dir
The wp-content directory if custom or not detected, such as wp-content--wp-plugins-dir
The plugins directory if custom or not detected, such as wp-content/plugins--wp-version-all
Check all the version locations--db-exports-list
List of DB exports' paths to use--password-attack
Force the supplied attack to be used rather than automatically determining one. Multicall will only work against WP < 4.4. Available choices: wp-login, xmlrpc, xmlrpc-multicall--request-timeout
The request timeout in seconds. Default: 60--users-detection
Use the supplied mode to enumerate Users, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--users-list
List of users to check during the users enumeration from the Login Error Messages--medias-detection
Use the supplied mode to enumerate Medias, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--themes-detection
Use the supplied mode to enumerate Themes, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--themes-list
List of themes to enumerate.--themes-threshold
Raise an error when the number of detected themes via known locations reaches the threshold. Set to 0 to ignore the threshold. Default: 20--user-agents-list
List of agents to use with --random-user-agent--usernames
List of usernames to use during the password attack. Examples: 'a1', 'a1,a2,a3'--exclude-usernames
Exclude usernames matching the Regexp/string (case insensitive). Regexp delimiters are not required.--max-scan-duration
Abort the scan if it exceeds the time provided in seconds--plugins-detection
Use the supplied mode to enumerate Plugins. Default: passive. Available choices: mixed, passive, aggressive--plugins-list
List of plugins to enumerate.--plugins-threshold
Raise an error when the number of detected plugins via known locations reaches the threshold. Set to 0 to ignore the threshold. Default: 100--random-user-agent
Additional headers to append in requests. Separator to use between the headers: '; '. Examples: 'X-Forwarded-For: 127.0.0.1', 'X-Forwarded-For: 127.0.0.1; Another: aaa'--users-list
List of users to check during the users enumeration from the Login Error Messages. Examples: 'a1', 'a1,a2,a3'--cache-ttl
The cache time to live in seconds. Default: 600--connect-timeout
The connection timeout in seconds. Default: 30--disable-tls-checks
Disables SSL/TLS certificate verification, and downgrade to TLS1.0+ (requires cURL 7.66 for the latter)--themes-list
List of themes to enumerate. Examples: 'a1', 'a1,a2,a3'--themes-version-all
Check all the themes version locations according to the choosen mode (--detection-mode, --themes-detection and --themes-version-detection)--config-backups-list
List of config backups' filenames to use'--plugins-list
List of plugins to enumerate. Examples: 'a1', 'a1,a2,a3'--plugins-version-all
Check all the plugins version locations according to the choosen mode (--detection-mode, --plugins-detection and --plugins-version-detection)--timthumbs-detection
Use the supplied mode to enumerate Timthumbs, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--db-exports-detection
Use the supplied mode to enumerate DB Exports, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--ignore-main-redirect
Ignore the main redirect (if any) and scan the target url--main-theme-detection
Use the supplied mode for the Main theme detection, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--wp-version-detection
Use the supplied mode for the WordPress version detection, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--exclude-content-based
Exclude all responses matching the Regexp (case insensitive) during parts of the enumeration. Both the headers and body are checked. Regexp delimiters are not required.--multicall-max-passwords
Maximum number of passwords to send by request with XMLRPC multicall. Default: 500--config-backups-detection
Use the supplied mode to enumerate Config Backups, instead of the global (--detection-mode) mode. Available choices: mixed, passive, aggressive--themes-version-detection
Use the supplied mode to check themes versions instead of the --detection-mode or --themes-detection modes. Available choices: mixed, passive, aggressive--cookie-jar
File to read and write cookies--plugins-version-detection
Use the supplied mode to check plugins versions. Default: mixed. Available choices: mixed, passive, aggressive--interesting-findings-detection
Use the supplied mode for the interesting findings detection. Available choices: mixed, passive, aggressive