Closed sullo closed 5 years ago
Managed to get it working with a couple extra flags, --force
to ignore the "is WordPress" check and then specify the wp-content directory with --wp-content-dir /wp-content/
.
So the full command looks like this:
wpscan --url https://x.jet.com/ --detection-mode aggressive -e ap --ignore-main-redirect --random-user-agent --force --wp-content-dir /wp-content/
P.S. I think you might need to add --plugins-detection aggressive
for what it looks like you're trying to do.
Thanks!
So why isn't '--detection-mode aggressive' not enough and '--plugins-detection aggressive ' is needed? IMHO, this is getting a little complicated to just brute force plugins :/
On Fri, Nov 23, 2018 at 4:17 AM Ryan Dewhurst notifications@github.com wrote:
Closed #1253 https://github.com/wpscanteam/wpscan/issues/1253.
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/wpscanteam/wpscan/issues/1253#event-1983687314, or mute the thread https://github.com/notifications/unsubscribe-auth/ABaBRKUiileiHm34W1_rccC3cTX9edcvks5ux70dgaJpZM4YwGXZ .
--
This is an oddball. / redirects to jetblog.jet.com, however, x.jet.com also has a wordpress installation. I can't make wpscan understand that a site is there, however.
Trying:
ruby bin/wpscan --url https://x.jet.com:443/ --detection-mode aggressive -e ap --ignore-main-redirect --random-user-agent -vv
(Also, *.jet.com is in bug bounty: https://bugcrowd.com/jet)
Your environment