Wordpress
WPScan
# Default enumeration
wpscan --url https://parzival.sh/
# Enumerate usernames
wpscan --url https://parzival.sh/ -e u
# Bruteforce Wordpress
wpscan --url https://parzival.sh/ -U $usernamelist -P $passwordlistTurning XSS to RCE
When identifying a Wordpress site that is vulnerable to cross-site scripting, there are some well documented payloads and resources out there which increase the severity if an Administrator were to trigger the payload. For example, if a stored cross-site scripting vulnerability affects a plugin. The following is a snippet of a Hakluke payload linked below which attempts to create a new administrator user:
Last updated