WordPress Discovery & Enumeration
π― Objective: Master the identification, enumeration, and intelligence gathering techniques for WordPress installations to build comprehensive attack profiles.
Overview
WordPress powers approximately 32.5% of all websites on the internet, making it the most prevalent CMS we'll encounter during penetration testing. Understanding WordPress architecture, enumeration techniques, and vulnerability patterns is essential for successful web application assessments.
Key Statistics:
50,000+ plugins and 4,100+ themes available
54% of vulnerabilities originate from plugins
31.5% from WordPress core, 14.5% from themes
8% of compromises due to weak passwords
60% due to outdated versions
WordPress Architecture & Components
Core Directory Structure
/wp-admin/ # Administrative backend
/wp-content/ # Themes, plugins, uploads
/plugins/ # Third-party plugins
/themes/ # WordPress themes
/uploads/ # User-uploaded content
/wp-includes/ # Core WordPress files
wp-config.php # Configuration file
wp-login.php # Login page
xmlrpc.php # XML-RPC interface
readme.html # Version information
robots.txt # Search engine directivesUser Role Hierarchy
Discovery & Fingerprinting
Initial Identification Techniques
Method 1: robots.txt Analysis
Method 2: HTML Meta Generator Tag
Method 3: Directory Detection
Method 4: File Signature Detection
Manual Enumeration Techniques
Theme Identification & Analysis
Discovering Active Theme
Theme Version Detection
Plugin Discovery & Enumeration
Source Code Analysis
Direct Plugin Testing
Plugin Version Detection
Directory Listing Exploitation
Checking for Exposed Directories
XML-RPC Discovery
User Enumeration Techniques
Login Error Message Analysis
Username Enumeration via Login Form
Author ID Enumeration
REST API User Enumeration
Automated Enumeration with WPScan
Installation & Setup
Basic Enumeration Scan
Advanced WPScan Usage
Plugin-Focused Enumeration
User Enumeration & Brute Force
Custom Wordlists
WPScan Output Analysis
Vulnerability Assessment
Version Detection Strategies
Core WordPress Version
Plugin/Theme Versioning
Intelligence Gathering Workflow
Comprehensive Enumeration Checklist
Phase 1: Initial Discovery
Phase 2: Component Analysis
Phase 3: Vulnerability Mapping
Phase 4: Attack Surface Assessment
Common Vulnerability Patterns
High-Priority Findings
Outdated Core Installation
Vulnerable Plugins
Default/Weak Credentials
Directory Listing Enabled
Example Discovery Session
Target: blog.inlanefreight.local
Step 1: Initial Fingerprinting
Step 2: Theme & Plugin Discovery
Step 3: User Enumeration
Step 4: Automated Validation
Professional Documentation
Enumeration Findings Template
HTB Academy Lab Solutions
Lab Questions
Q1: Find flag.txt in accessible directory
Solution Methodology:
Q2: Discover additional plugin (manual enumeration)
Solution Methodology:
Q3: Find plugin version number
Solution Methodology:
Next Steps
After completing enumeration, proceed to:
WordPress Attacks & Exploitation - Weaponizing discovered vulnerabilities
Privilege Escalation - Gaining administrative access
Post-Exploitation - Maintaining access and lateral movement
π‘ Key Takeaway: Thorough enumeration is critical for WordPress assessments. Manual techniques often discover vulnerabilities missed by automated scanners, while automated tools validate and expand manual findings.
Last updated