Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WPProbe is a lightweight, fast and reliable tool to discover WordPress.
#1
Especially useful for cybersecurity professionals looking for maximum coverage with minimal detection. ‚
? Operation modes
1️⃣ Stealthy (stealth) - Default method:
- Check for exposed routes, such as? rest_route=/plugins/...
- Compare discovered routes with known patterns
- Get the module version (when available) and compare it to known vulnerabilities (CVE)
2️⃣ Brute Force
- Try to access the plugin directory directly (p. EJ. : /wp-content/plugins/name)
- Detect modules whose route does not throw a 404 error
- Get versions and CVE maps
3️⃣ Hybrid
- Start in stealth mode.
- Then brute force it into what was not initially detected
- Provides maximum range while maintaining discretion
?️ https://github.com/Chocapikk/wpprobe


Attached Files Thumbnail(s)
   
Reply
#2
Thank you so much for this.
Reply
#3
What are the potential risks of using WPProbe’s Brute Force mode on a live WordPress site, and how can they be mitigated?
poisk-ls | Cyber security Enthusiast
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)