WPscan – Discovering the Vulnerabilities and Enumerating Users of WordPress Sites with Autotor for IP Spoofing

WPscan – Discovering the Vulnerabilities and Enumerating Users of WordPress Sites with Autotor for IP Spoofing

Authors

  • Ms. Rini Kurian a:1:{s:5:"en_US";s:3:"ktu";}
  • Tebin Jose KTU

Keywords:

WPscan, WordPress,, vulnerability, AutoTor, IP Spoofing.

Abstract

WPscan is an open source WordPress security
scanner. You can use it to scan your WordPress website for
known vulnerabilities in popular WordPress plugins and
themes. Since it is a black box scanner, it almost copies an
action of a real attacker. This means that for conducting the
tests, it does not depend on any access to your WordPress
dashboard or source code. To put it another way, if WPscan
can find a flaw in your WordPress website, an attacker can
too. An attacker trying to either guess or confirm that
something they are targeting exists on the target system is
commonly termed as Enumeration.
Some of the most commonly enumeration scans that WPscan
does during a scan are:
 Detection of versions of WordPress core, plugins and
themes,
 Looks for wp-config.php backups or other database
exports that are open to the public.
 Counting the number of users and administrators

 

Author Biography

Tebin Jose, KTU

 

 

Published

2022-12-20

How to Cite

Ms. Rini Kurian, & Tebin Jose. (2022). WPscan – Discovering the Vulnerabilities and Enumerating Users of WordPress Sites with Autotor for IP Spoofing. National Conference on Emerging Computer Applications, 3(1). Retrieved from https://ajcejournal.in/nceca/article/view/75

Most read articles by the same author(s)

1 2 > >> 
Loading...