{"id":1902,"date":"2022-07-01T13:37:46","date_gmt":"2022-07-01T11:37:46","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=1902"},"modified":"2024-02-07T10:50:52","modified_gmt":"2024-02-07T09:50:52","slug":"test-the-security-of-your-wordpress-website","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/test-the-security-of-your-wordpress-website\/","title":{"rendered":"Test the security of your WordPress website"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/06\/WordPress-logotype-wmark.png&#8221; alt=&#8221;Check the security of your WordPress site&#8221; title_text=&#8221;WordPress-logotype-wmark&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>WordPress is a free, open-source, and free content management system (CMS). It allows the editing of rich and dynamic websites, and benefits from an important ecosystem of plugins and themes. According to <a href=\"https:\/\/fr.wordpress.org\/download\/\" target=\"_blank\" rel=\"noopener\" title=\"43% of websites are based on WordPress\">wordpress.org<\/a>, 43% of websites are based on the WordPress CMS.<\/p>\n<p>It is therefore no surprise that <strong>WordPress is a prime target for hackers<\/strong>: poorly configured websites and servers, vulnerable plugins, delayed updates.<\/p>\n<p>This article focuses on quick and easy techniques to test yourself if your WordPress site can be attacked by newbies. Above all, it does not replace <a href=\"https:\/\/wordpress.org\/support\/article\/hardening-wordpress\/\" target=\"_blank\" rel=\"noopener\" title=\"WordPress documentation guide to harden the security of your WordPress site\">a hardening of the security<\/a> of your website.<\/p>\n<p>These tests are intrusive and should be run on systems that you own or for which you have been given explicit permission.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;wpscan&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 class=\"part\" data-startline=\"14\" data-endline=\"14\">1. Using wpscan<\/h2>\n<p style=\"text-align: justify;\">The <a href=\"https:\/\/wpscan.com\/wordpress-security-scanner\" title=\"Link to wpscan official website\" target=\"_blank\" rel=\"noopener\">wpscan <\/a>tool is an easy-to-use WordPress configuration flaw and vulnerability scanner. It is included in the <a href=\"https:\/\/www.kali.org\/tools\/wpscan\/\" target=\"_blank\" rel=\"noopener\" title=\"wpscan kali linux documentation\">Kali Linux <\/a>distribution but can also be easily used separately thanks to its <a href=\"https:\/\/hub.docker.com\/r\/wpscanteam\/wpscan\/\" title=\"wpscan Docker image\" target=\"_blank\" rel=\"noopener\">docker image<\/a>.<\/p>\n<p style=\"text-align: justify;\">In order to benefit from all the functionalities of wpscan it is preferable to <a href=\"https:\/\/github.com\/wpscanteam\/wpscan\/wiki\/WPScan-User-Documentation#optional-wordpress-vulnerability-database-api\" target=\"_blank\" rel=\"noopener\" title=\"documentation on creating the API key for wpscan\">create an API key<\/a> on <em>WPScan.com<\/em>. This step is optional but allows you to benefit from the WordPress vulnerabilities database.<\/p>\n<p style=\"text-align: justify;\">Here are some examples of wpscan commands to detect a maximum of WordPress vulnerabilities and misconfigurations:<\/p>\n<blockquote>\n<p style=\"text-align: justify;\"># Default scan of https:\/\/your.site.wordpress\/ with a random <em>User-Agent<\/em> and no HTTPS certificate verification (in case you haven&#8217;t installed it yet)<\/p>\n<p style=\"text-align: justify;\"><strong>wpscan &#8211;rua &#8211;api-token {TOKEN} &#8211;disable-tls-checks &#8211;url https:\/\/your.website.wordpress\/<\/strong><\/p>\n<\/blockquote>\n<blockquote>\n<p style=\"text-align: justify;\"># More comprehensive scan: Lists top 50 WordPress users, all known themes and plugins, configuration backups, timthumbs and exports. Random <em>User-Agent<\/em> and no HTTPS certificate verification.<\/p>\n<p style=\"text-align: justify;\"><strong>wpscan &#8211;rua &#8211;api-token {TOKEN} &#8211;disable-tls-checks -e u1-50,m,vp,vt,tt,cb,dbe &#8211;url https:\/\/your.website.wordpress\/<\/strong><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">The wpscan results are composed of different categories and offer links to documentation each time:<\/p>\n<ul>\n<li style=\"text-align: justify;\">At the beginning you will find configuration faults, things that stands out, and general information<\/li>\n<li style=\"text-align: justify;\">Then there is the version of WordPress if detected, with its possible vulnerabilities<\/li>\n<li style=\"text-align: justify;\">Discovered plugins and their vulnerabilities<\/li>\n<li style=\"text-align: justify;\">The same with WordPress themes<\/li>\n<li style=\"text-align: justify;\">And finally the list of backups, exports, timthumb, media and users<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/07\/wpscan_example-300x236.png\" alt=\"WPscan DSecBypass wordpress security\" class=\"wp-image-2120 alignnone size-medium\" style=\"display: block; margin-left: auto; margin-right: auto;\" width=\"300\" height=\"236\"><\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;virus&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>2. Manual additional checks<\/h2>\n<p style=\"text-align: justify;\">Although <a href=\"#wpscan\">wpscan <\/a>can trace a large number of WordPress vulnerabilities, a few additional manual tests can eliminate some common weaknesses.<\/p>\n<p class=\"LC20lb MBeuO DKV0Md\">\u274c <strong>WordPress directory listing<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Test accessing the <em>\/wp-content\/<\/em>, <em>\/wp-content\/uploads\/<\/em>, <em>\/wp-includes\/<\/em> directories in your web browser. For example <em>https:\/\/your.website.wordpress\/wp-content\/uploads\/<\/em>. The list of files and folders should not appear!<\/p>\n<\/blockquote>\n<p class=\"LC20lb MBeuO DKV0Md\">\u274c <strong>Obvious passwords<br \/><\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">If you have access to the list of users of your WordPress site (<em>https:\/\/your.site.wordpress\/wp-admin\/users.php<\/em>) or several accounts have been discovered by <a href=\"#wpscan\">wpscan<\/a>, try one or two passwords obvious: username, company name, site\/blog name. <strong>Be careful not to make too many attempts<\/strong>, you could block your accounts.<\/p>\n<\/blockquote>\n<p>\u274c <strong>Log files indexed by Google<\/strong><\/p>\n<blockquote>\n<p>WordPress log files may be indexed by Google. These log files sometimes leak sensitive information. To detect them, the following Google search can be used (<a href=\"https:\/\/www.dsecbypass.com\/en\/faq-frequently-asked-questions-information-security-lyon\/#recon-passive\" title=\"Google Dorks are part of the passive phase of the pentest\"><em>Google Dork<\/em><\/a>):<\/p>\n<p><strong>inurl:log -intext:log ext:log inurl:wp- site:your.website.wordpress<\/strong><\/p>\n<\/blockquote>\n<p class=\"LC20lb MBeuO DKV0Md\">\ud83d\udca1 Other vulnerabilities and misconfigurations require the skills of cybersecurity experts (pentesters) to be detected and exploited. An <a href=\"https:\/\/www.dsecbypass.com\/en\/penetration-tests-pentest-security-audits-lyon\/\" title=\"DSecBypass information security audit\">intrusion test<\/a> can reveal all these weaknesses and guide you in their remediation.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\"><span>\ud83d\udee1\ufe0f DSecBypass supports you on the <a href=\"https:\/\/www.dsecbypass.com\/en\/website-pentest\/\" title=\"Website pentest and WordPress pentest\">security audits of your websites<\/a>, in particular the WordPress security audits. Do not hesitate to <a href=\"https:\/\/www.dsecbypass.com\/en\/contact\/\">contact <\/a>us for additional information and\/or a personalized quote \ud83d\udcdd.<\/span><\/p>\n<p style=\"text-align: left;\">[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to quickly test the security of your WordPress site with the wpscan tool and some pentester tips.<\/p>\n","protected":false},"author":4,"featured_media":1890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-1902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1902"}],"version-history":[{"count":34,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1902\/revisions"}],"predecessor-version":[{"id":3255,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1902\/revisions\/3255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1890"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=1902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=1902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}