WordPress Discovery & Enumeration

🎯 Objective: Master the identification, enumeration, and intelligence gathering techniques for WordPress installations to build comprehensive attack profiles.

Overview

WordPress powers approximately 32.5% of all websites on the internet, making it the most prevalent CMS we'll encounter during penetration testing. Understanding WordPress architecture, enumeration techniques, and vulnerability patterns is essential for successful web application assessments.

Key Statistics:

  • 50,000+ plugins and 4,100+ themes available

  • 54% of vulnerabilities originate from plugins

  • 31.5% from WordPress core, 14.5% from themes

  • 8% of compromises due to weak passwords

  • 60% due to outdated versions


WordPress Architecture & Components

Core Directory Structure

/wp-admin/          # Administrative backend
/wp-content/        # Themes, plugins, uploads
  /plugins/         # Third-party plugins
  /themes/          # WordPress themes
  /uploads/         # User-uploaded content
/wp-includes/       # Core WordPress files
wp-config.php       # Configuration file
wp-login.php        # Login page
xmlrpc.php          # XML-RPC interface
readme.html         # Version information
robots.txt          # Search engine directives

User Role Hierarchy


Discovery & Fingerprinting

Initial Identification Techniques

Method 1: robots.txt Analysis

Method 2: HTML Meta Generator Tag

Method 3: Directory Detection

Method 4: File Signature Detection


Manual Enumeration Techniques

Theme Identification & Analysis

Discovering Active Theme

Theme Version Detection

Plugin Discovery & Enumeration

Source Code Analysis

Direct Plugin Testing

Plugin Version Detection

Directory Listing Exploitation

Checking for Exposed Directories

XML-RPC Discovery


User Enumeration Techniques

Login Error Message Analysis

Username Enumeration via Login Form

Author ID Enumeration

REST API User Enumeration


Automated Enumeration with WPScan

Installation & Setup

Basic Enumeration Scan

Advanced WPScan Usage

Plugin-Focused Enumeration

User Enumeration & Brute Force

Custom Wordlists

WPScan Output Analysis

Vulnerability Assessment


Version Detection Strategies

Core WordPress Version

Plugin/Theme Versioning


Intelligence Gathering Workflow

Comprehensive Enumeration Checklist

Phase 1: Initial Discovery

Phase 2: Component Analysis

Phase 3: Vulnerability Mapping

Phase 4: Attack Surface Assessment


Common Vulnerability Patterns

High-Priority Findings

Outdated Core Installation

Vulnerable Plugins

Default/Weak Credentials

Directory Listing Enabled


Example Discovery Session

Target: blog.inlanefreight.local

Step 1: Initial Fingerprinting

Step 2: Theme & Plugin Discovery

Step 3: User Enumeration

Step 4: Automated Validation


Professional Documentation

Enumeration Findings Template


HTB Academy Lab Solutions

Lab Questions

Q1: Find flag.txt in accessible directory

Solution Methodology:

Q2: Discover additional plugin (manual enumeration)

Solution Methodology:

Q3: Find plugin version number

Solution Methodology:


Next Steps

After completing enumeration, proceed to:

  1. WordPress Attacks & Exploitation - Weaponizing discovered vulnerabilities

  2. Privilege Escalation - Gaining administrative access

  3. Post-Exploitation - Maintaining access and lateral movement

πŸ’‘ Key Takeaway: Thorough enumeration is critical for WordPress assessments. Manual techniques often discover vulnerabilities missed by automated scanners, while automated tools validate and expand manual findings.

Last updated