WordPress ReadMe

WordPress ReadMe

Question

A penetration tester is exploring a client's website.

The tester performs a curl command and obtains the following: * Connected to 10.2.11.144 (::1) port 80 (#0) > GET /readmine.html HTTP/1.1 > Host: 10.2.11.144 > User-Agent: curl/7.67.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 < Date: Tue, 02 Feb 2021 21:46:47 GMT < Server: Apache/2.4.41 (Debian) < Content-Length: 317 < Content-Type: text/html; charset=iso-8859-1 < <!DOCTYPE html> <html lang='en'> <head> <meta name='viewport' content='width=device-width' /> <meta http-equiv='Content-Type' content='text/html; charset=utf-8' /> <title>WordPress › ReadMe</title> <link rel='stylesheet' href='wp-admin/css/install.css?ver=20100228' type='text/css' /> </head> Which of the following tools would be BEST for the penetration tester to use to explore this site further?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

https://tools.kali.org/web-applications/burpsuite

Based on the provided output, it appears that the penetration tester has connected to the client's website using the curl command and received a response indicating that the website is hosted on an Apache server and the requested page "readmine.html" has been returned with a HTTP 200 status code. The website is also running WordPress, as indicated by the page title.

To explore the website further, the penetration tester should use a web application scanner tool. Web application scanners automate the process of identifying vulnerabilities in web applications, including those hosted on WordPress. The four tools provided as answer choices are all examples of web application scanners, but each has its own strengths and weaknesses.

A. Burp Suite: Burp Suite is a popular web application scanner that is widely used by penetration testers. It is a comprehensive tool that includes many features beyond vulnerability scanning, including intercepting and modifying web traffic, fuzzing, and performing automated scans. Burp Suite can be used to scan for vulnerabilities in WordPress sites, but it may require more manual configuration than other tools specifically designed for WordPress.

B. DirBuster: DirBuster is a tool specifically designed for directory and file enumeration. It can be used to discover hidden directories and files on a web server that may contain sensitive information or provide a point of entry for attackers. While DirBuster can be useful for reconnaissance, it is not a comprehensive web application scanner and may miss vulnerabilities in WordPress sites.

C. WPScan: WPScan is a specialized tool for scanning WordPress sites for vulnerabilities. It includes a database of known WordPress vulnerabilities and can perform brute force attacks on WordPress login pages. WPScan is a good choice for exploring a WordPress site in depth, as it is designed specifically for this purpose.

D. OWASP ZAP: OWASP ZAP is an open-source web application scanner that is highly configurable and extensible. It includes a variety of features beyond vulnerability scanning, including intercepting and modifying web traffic, and fuzzing. While it can be used to scan for vulnerabilities in WordPress sites, it may require more manual configuration than other tools specifically designed for WordPress.

In summary, while all of the provided tools could be used to explore the client's website, WPScan is the best choice for a penetration tester looking to explore a WordPress site in depth.