Wpscan Command List
WPScan Command Guide
WPScan is a black box WordPress vulnerability scanner. It scans remote WordPress installations to find security issues such as vulnerable plugins, themes, weak passwords, and configuration/information leaks.
Top 10 Useful Commands
1. Basic Scan
wpscan --url http://example.com
Explanation: Performs a basic non-intrusive scan to detect version, theme, and basic headers.
2. Enumerate Vulnerable Plugins
wpscan --url http://example.com --enumerate vp
Explanation: Specifically searches for plugins (p) that have known vulnerabilities (v).
3. Enumerate All Users
wpscan --url http://example.com --enumerate u
Explanation: Attempts to harvest usernames (via author archives, REST API, etc.). Crucial for later brute-force attacks.
4. Enumerate Vulnerable Themes
wpscan --url http://example.com --enumerate vt
Explanation: Checks the installed theme against the database of known vulnerabilities.
5. Brute Force Login
wpscan --url http://example.com -U users.txt -P passwords.txt
Explanation: Tries to login using a list of users (-U) and passwords (-P) against wp-login.php.
6. Aggressive Detection
wpscan --url http://example.com --detection-mode aggressive
Explanation: Sends more intrusive requests to permit better detection, though prone to false positives or 403 blocks.
7. Use API Token (Deeper Scan)
wpscan --url http://example.com --api-token <YOUR_TOKEN>
Explanation: Uses the WPVulnDB API token (free account) to show vulnerability data in the output. Without this, you just see plugin versions.
8. Ignore SSL Verify
wpscan --url https://example.com --disable-tls-checks
Explanation: Useful for internal tests where certificates might be invalid or self-signed.
9. Scan via Proxy
wpscan --url http://example.com --proxy http://127.0.0.1:8080
Explanation: Routes traffic through Burp Suite or another proxy.
10. Timbs-out (Anti-WAF)
wpscan --url http://example.com --random-user-agent --throttle 500
Explanation: Randomized UA and throttled requests (500ms delay) to avoid WAF blocking.
The Most Powerful Command
The "Full Audit" command:
```bash
wpscan --url http://target.com --enumerate vp,vt,tt,cb,dbe,u,m --plugins-detection aggressive