WordPress enumeration using Metasploit

The following are the attack surfaces where you can focus your enumeration time:

Using the Metasploit module, auxiliary/scanner/http/wordpress_login_enum, follow these steps:

  1. You can try to brute-force the username or you can enumerate the username:
  1. Let's set the options just to enumerate the username and run the module:
  1. You can now try brute-forcing using a dictionary. The default options for the module enable it to perform a brute-force attack:
  1. Let's set the options now. We have set the username that we found from the preceding enumeration method:
  1. For a password dictionary, use the set PASS_FILE <file> command and run the module:

In the next section, we will look at vulnerability assessment scanning.