πŸ”ŽPart II – Enumeration

Enumeration is the first step after discovery. Once a target is identified as WordPress, the next move is to gather as much information as possible about its version, plugins, themes, users, and configurations. This information helps attackers (and pentesters) plan exploitation attempts.


πŸ“Œ Fingerprinting WordPress (fingerprinting)

Fingerprinting means detecting whether a website is running WordPress and what version it uses.

Techniques:

  1. Look for common paths:

  • /wp-login.php

  • /wp-admin/

  • /wp-content/

  • /xmlrpc.php

  • /wp-login/

  • /wp-admin.php

  • /login/

  1. Inspect HTML source code for:

  • meta name="generator" content="WordPress x.x.x"

    • Right click on the wordpress site --> inspect --> ctrl+f --> meta

  • WordPress-specific CSS/JS paths (e.g., /wp-includes/)

  1. Use online services/tools:

  • Wappalyzer is a browser extension that helps you quickly identify the technologies used by a website.

    • Detects CMS platforms (e.g., WordPress, Joomla, Drupal).

    • Shows frameworks, JavaScript libraries, analytics tools, and more.

    • Can often reveal the WordPress version, which is valuable during enumeration.

    • Easy to use and highly recommended for both beginners and professionals.

  1. Using Nikto

    Nikto is an open-source web server scanner that can help identify WordPress installations and potential vulnerabilities.

    Installation (if not already installed on Kali Linux):

    Basic Usage:

Output:


🎨 Finding Themes & Plugins (themes-plugins)

Themes and plugins are often the weakest link in WordPress security. Many vulnerabilities stem not from WordPress Core itself but from outdated or poorly coded themes and plugins. That’s why detecting them during enumeration is so important.

πŸ” Manual Methods

  • Themes usually live in:

  • Plugins usually live in:

Example:

Page Source Inspection

  • Open the website in a browser β†’ right-click β†’ View Source.

  • Look for wp-content/plugins/ or wp-content/themes/ references in:

    • CSS/JS includes

    • Image paths

    • Comments left by developers

Extract Versions from Assets


πŸ› οΈ WPScan & Other Tools (wpscan-tools)

WPScan is the go-to framework for WordPress enumeration. It leverages a large vulnerability database and makes detection efficient.

πŸš€ Install WPScan

πŸ”§ Basic Usage

  • Enumerate Plugins:

  • Enumerate Users:

Other Useful Tools:

  • whatweb β†’ quick tech fingerprinting

  • nmap + http-wordpress-enum.nse β†’ plugin/theme enumeration

  • gobuster / dirsearch β†’ brute-forcing hidden paths


A WordPress instance running on the machine, with accessible directories like /plugins/ for enumeration.

Hint 1

Try harder to search for some username and passwords for SSH with it.

Hint 2

Use wpscan to find username using -e u

Then search harder inside the files in /plugins

Solution

Features a vulnerable WordPress installation along with a specific vulnerable plugin that you can identify during enumeration.

Hint 1

You have to add the subdomain to /etc/hosts , and only then you will be able to find the site. After enumerate the site.

Hint 2

Look closer for vulnerable plugin version in the source code.

Solution

A retired HTB machine hosting WordPress. Enumeration tools can reveal key details like user accounts and version numbers.

Hint 1

You have to add the subdomain to /etc/hosts , and only then you will be able to find the site. After enumerate the site.

Hint 2

Try to use wpsacn more aggresive! check what this flag means --plugins-detection

Solution

Last updated