Wpscan v3.4.2 Releases | Black Box WordPress Vulnerability Scanner - TechnoExploit

Breaking

Post Top Ad

Post Top Ad

Saturday, December 29, 2018

Wpscan v3.4.2 Releases | Black Box WordPress Vulnerability Scanner


The DB is located at ~/.wpscan/db

WPScan can load all options (including the –url) from configuration files, the following locations are checked (order: first to last):


~/.wpscan/cli_options.json


~/.wpscan/cli_options.yml
pwd/.wpscan/cli_options.json
pwd/.wpscan/cli_options.yml
If those files exist, options from them will be loaded and overridden if found twice.
e.g:
~/.wpscan/cli_options.yml:


          proxy: ‘http://127.0.0.1:8080’
          verbose: true

pwd/.wpscan/cli_options.yml:
proxy: ‘socks5://127.0.0.1:9090’
url: ‘http://target.tld’

Running wpscan in the current directory (pwd), is the same as wpscan -v –proxy socks5://127.0.0.1:9090 –url http://target.tld

Copyright 2011-2018 WPScan Team.


Source: https://github.com/wpscanteam/

Also Read: Sandmap v1.2.0 Release: Network and System Reconnaissance Using The Massive Nmap Engine



1 comment:

Post Top Ad