Exploitation d'application

WordPress

sudo wpscan --url http://<machine_ip> --e --api-token 'jjj' 
sudo wpscan --password-attack xmlrpc -t 20 -U user -P /usr/share/wordlists/rockyou.txt --url http://<machine_ip>
  • Liste plugins : https://github.com/Perfectdotexe/WordPress-Plugins-List/blob/master/plugins.txt

Joomla

plugins/system/cache/cache.xml
administrator/index.php

droopescan scan joomla --url http://<machine_ip>/
python joomlascan.py -u http://<machine_ip>
python joomla-brute.py -u http://<machine_ip> -w rockyou.txt -usr admin

Drupal

CHANGELOG.txt
README.txt
droopescan scan drupal -u http://drupal.inlanefreight.local

Tomcat

GitLab

Mis à jour