Introducing WPScan - WordPress Security Scanner
After creating the WordPress Brute Force Tool last weekend, I decided to create a bigger project out of it, called WPScan.
WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses within WordPress installations. Its intended use it to be for security professionals or WordPress administrators to asses the security posture of their WordPress installations. The code base is Open Source and licensed under the GPLv3.
Weak password cracking (multithreaded)
Vulnerability enumeration (based on version)
Plugin vulnerability enumeration (based on version)
Other miscellaneous checks
**Please use the up to date instructions found here; http://wpscan.org/
WPScan requires two non native Ruby gems, typhoeus and xml-simple. It should work on both Ruby 1.8.x and 1.9.x.
sudo apt-get install libcurl4-gnutls-dev
sudo gem install --user-install typhoeus
sudo gem install --user-install xml-simple
(I developed WPScan on Backtrack5 Gnome 32bit, if installing on another OS, you may not need the --user-install option when installing the non native gems)
WPScan will be hosted on
Google Code GitHub at https://github.com/wpscanteam/wpscan.
You can download and start running WPScan ALPHA by
checking out cloning the SVN trunk git trunk.
"svn checkout http://wpscan.googlecode.com/svn/trunk/ wpscan-read-only"
git clone https://github.com/wpscanteam/wpscan.git
ruby wpscan.rb --url www.example.com
ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --threads 50
ruby wpscan.rb --url www.example.com --wordlist darkc0de.lst --username admin
Contributions, feedback, comments are welcome.