<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ramadhan</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ramadhan"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ramadhan"/>
		<updated>2026-04-28T00:57:31Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=204934</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=204934"/>
				<updated>2015-12-09T04:02:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Road Map */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
* Password auditing&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Stable Release]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*And run &amp;lt;tt&amp;gt;php app.php -h&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/d0lph1n98 Fakhri Zulkifli]&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204933</id>
		<title>OWASP Wordpress Security Implementation Guideline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204933"/>
				<updated>2015-12-09T03:50:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: added GrepBugs links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Considerations =&lt;br /&gt;
This project aims for a unified approach on WordPress security design and implementation. It is definitely more than a checklist, it's a guide for secure implementation and an invitation to consider and to analyze each individual case. &lt;br /&gt;
&lt;br /&gt;
There is a long list of recommended resources for securing aspects of the WordPress implementation. The project is aimed to offer open source or free resources instead of commercial ones. Some plugins have a free version and a paid one that offers extra functionality. In such cases, the focus of the project was on the free version.&lt;br /&gt;
&lt;br /&gt;
= General security =&lt;br /&gt;
This section is meant to be just a reminder that all the other hardening measures are useless if an attacker can gain access to WordPress users’ computers. We’re not going to spend the time and effort to go into details but rather enumerate the common good practices each security conscious user should have in mind. There are plenty of good resources to help anyone accomplish security basics.&lt;br /&gt;
&lt;br /&gt;
== Device security ==&lt;br /&gt;
When we talk about devices capable of accessing the WordPress administration interface we don’t just talk about computers but mobile devices as well. The following is a list of items that needs to be taken into account when securing the devices that will be accessing the WordPress instances. Some of them may refer to PCs and mobile devices, others just to one of the devices.&lt;br /&gt;
&lt;br /&gt;
* Password protect the device&lt;br /&gt;
* Use strong passwords&lt;br /&gt;
* Keep the OS updated&lt;br /&gt;
* Encrypt the storage&lt;br /&gt;
* Have an anti-virus installed and updated&lt;br /&gt;
* Have a malware/spyware scanner installed and perform regular scans and updates&lt;br /&gt;
* Have a firewall installed and configured &lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm Secure your browser]&lt;br /&gt;
&lt;br /&gt;
= Infrastructure security =&lt;br /&gt;
Before hardening the core of WordPress an implementer must consider hardening the services on which the instance will be installed. Sometimes the underlying infrastructure is not under the control of the implementer. While there are things that can be hardened on WordPress to mitigate things that are supposed to be fixed on the infrastructure side, one should always consider defense in depth. The implementer can contact the infrastructure administrator and ask for specific hardening in order to further protect the applications that will be installed on top of that, in this case WordPress. &lt;br /&gt;
&lt;br /&gt;
The foundation of infrastructure hardening is operating system hardening. This is a broad subject and highly dependent on the OS, the main concerns being around privileges, access control, authentication and logging. It’s a topic outside the coverage of the current project and these are things that must be covered by experienced System Administrators.&lt;br /&gt;
&lt;br /&gt;
WordPress can be installed on a multitude of platforms but the main focus below is on the most common components, Apache and MySQL. The general rules though apply to all supported infrastructure components. &lt;br /&gt;
&lt;br /&gt;
Following best design practices, the tiers of the WordPress instance should be separated. However the presentation and application layers of WordPress are bound together. Thus only one separation is possible, the one with the database. For small applications it’s not a common practice, but for larger sites this becomes a must from a security but also a performance perspective. &lt;br /&gt;
&lt;br /&gt;
As was the case with general security, this is just a list of things that should be performed in order to harden the infrastructure and not the means to do it. &lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable directory listing&lt;br /&gt;
* Secure the communication with the server by generating and using SSL certificates&lt;br /&gt;
* Disable unnecessary modules&lt;br /&gt;
** Good candidates for this are: ''userdir'', ''suexec'', ''cgi/cgid'', ''include'', ''autoindex''&lt;br /&gt;
* Run the daemon as a separate user and group&lt;br /&gt;
* Use ''Allow'' and ''Deny'' to restrict access to directories&lt;br /&gt;
* Use ''mod_security'' module to secure Apache&lt;br /&gt;
* Disable following of ''symbolic links''&lt;br /&gt;
* Turn off server sides includes and CGI execution&lt;br /&gt;
* Limit request size&lt;br /&gt;
* Configure other settings like ''TimeOut'', ''MaxClients'', ''KeepAliveTimeout'', ''LimitRequestFields'', ''LimitRequestFieldSize'' in order to prevent DoS attacks&lt;br /&gt;
* Enable and configure proper logging&lt;br /&gt;
* Modify server banner&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Don’t install PHP as a CGI binary&lt;br /&gt;
* Disable unnecessary PHP modules&lt;br /&gt;
* Disable unused potentially dangerous PHP functions (good examples: ''exec'',''passthru'',''shell_exec'',''system'', etc.)&lt;br /&gt;
* Log errors internally&lt;br /&gt;
* Disable verbose error reporting on the client side&lt;br /&gt;
* Turn off remote code execution (if it’s not needed; the core WordPress doesn’t need this functionality)&lt;br /&gt;
* Disable magic quotes&lt;br /&gt;
* Limit PHP access to file system&lt;br /&gt;
* Protect from DoS&lt;br /&gt;
** Control POST size&lt;br /&gt;
** Limit script time execution&lt;br /&gt;
** Limit memory usage&lt;br /&gt;
* Consider implementing the [http://www.suhosin.org/stories/index.html Suhoshin security extension]&lt;br /&gt;
* Hide the version of PHP in use&lt;br /&gt;
* Hide the .php extension&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
There is an entire [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening OWASP project dedicated to MySQL hardening]. The main action items are:&lt;br /&gt;
&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable or restrict remote access&lt;br /&gt;
* Filesystem access restrictions and ACLs&lt;br /&gt;
* Designing a chroot-jail&lt;br /&gt;
* Encrypting network traffic (this is a must if the database layer is physically separated from the application layer)&lt;br /&gt;
* Encrypting raw databases on filesystem level&lt;br /&gt;
** Redundant if disk encryption is in place at the OS layer&lt;br /&gt;
** However, by using ''dmcrypt'', one can generate an extra layer of encryption&lt;br /&gt;
* Backup encryption&lt;br /&gt;
* Configuration&lt;br /&gt;
** Connectivity: maximum number of concurrent connections and related settings&lt;br /&gt;
** Logging&lt;br /&gt;
** Access control and privilege management&lt;br /&gt;
** Set up root password&lt;br /&gt;
** Rename root account&lt;br /&gt;
** Delete unused users and databases&lt;br /&gt;
** Remove installation history&lt;br /&gt;
&lt;br /&gt;
A PHP security checker is available [https://github.com/sektioneins/pcc here]. This is a one-page php file designed to analyze PHP configuration and rank the findings based on severity.&lt;br /&gt;
&lt;br /&gt;
== Remote access ==&lt;br /&gt;
* Don’t use FTP (use sFTP where possible)&lt;br /&gt;
* If SSH access is available, use [http://linux.die.net/man/1/scp scp] or [http://winscp.net/eng/index.php WinSCP] for file transfer &lt;br /&gt;
* Consider using VPN or [http://www.pentest.ro/ssh-tunnels-an-alternative-to-vpn/ SSH tunnels] to the server for accessing the WordPress administrative interface&lt;br /&gt;
&lt;br /&gt;
= WordPress security =&lt;br /&gt;
There are three main components of WordPress that need to be considered from a security perspective when implementing the solution.&lt;br /&gt;
&lt;br /&gt;
* Core – the basic default installation files that provide most of the functionality &lt;br /&gt;
* Plugins – special written code to improve and extend the basic functionality&lt;br /&gt;
* Theme – the presentation layer which may come with some limited extended functionality&lt;br /&gt;
&lt;br /&gt;
== Updates ==&lt;br /&gt;
It is of vital importance to keep WordPress core, plugins and themes updated. Once an update is released, it needs to be applied as soon as possible to close any security holes. &lt;br /&gt;
&lt;br /&gt;
Functional problems with updates must be considered. It is possible that an update will break some of the functionality so a backup is recommended before updating the core. &lt;br /&gt;
&lt;br /&gt;
=== WordPress Core ===&lt;br /&gt;
The WordPress core has three different types of updates:&lt;br /&gt;
&lt;br /&gt;
* Core development updates, known as the &amp;quot;bleeding edge&amp;quot;&lt;br /&gt;
* Minor core updates, such as maintenance and security releases&lt;br /&gt;
* Major core release updates&lt;br /&gt;
&lt;br /&gt;
Starting with version 3.7, automatic background updates were introduced by default for minor core updates releases (generally security updates). This default behavior can be overridden by editing the wp-config.php file and adding or modifying the following statement&lt;br /&gt;
&lt;br /&gt;
''define( 'WP_AUTO_UPDATE_CORE', true );''&lt;br /&gt;
&lt;br /&gt;
When set to true all updates will be enabled. Translations are updated by default with the minor core updates.&lt;br /&gt;
&lt;br /&gt;
=== Themes and Plugins ===&lt;br /&gt;
The themes and plugins can be updated automatically using filters. The best place to put a filter is in a [http://codex.wordpress.org/Must_Use_Plugins must-use plugin]. WordPress doesn’t recommend putting filters in the wp-config.php file because of conflicts with other parts of the code.&lt;br /&gt;
&lt;br /&gt;
To enable automatic updates for themes and plugins, add the following code&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_plugin', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_theme', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
== Removal of unused plugins and themes ==&lt;br /&gt;
Depending on the server configuration, the files in the WordPress folder can be accessed from the Internet regardless of whether they are used or not. Even if a plugin is disabled, the files are still there and they are accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
When a new vulnerability is discovered, the attackers write scripts to look for the vulnerable files. Knowing the location of vulnerable plugins increases their chances of infiltrating a vulnerable instance. &lt;br /&gt;
&lt;br /&gt;
Any plugins and themes that are not actively used must be deleted. &lt;br /&gt;
&lt;br /&gt;
== Plugins &amp;amp; Themes Security ==&lt;br /&gt;
Plugins and themes are a great addition to the functionality offered by the WordPress core. WordPress’ success is based on these elements. It’s easy to develop a new theme, add new functions with plugins. This ease of development comes with the security downside. In the rush for functionality, the developers often forget about security. Looking at the [https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wordpress CVE list for WordPress] it’s worth noticing that in the past years most of the security defects are affecting the plugins and themes and not WordPress core.&lt;br /&gt;
&lt;br /&gt;
Developing on top of WordPress should be regarded as a regular development job and follow a standard secure development lifecycle. Concrete action items for this chapter include source code review and penetration testing of plugins and themes.&lt;br /&gt;
&lt;br /&gt;
When choosing to use an already developed plugin by a 3&amp;lt;sup&amp;gt;rd&amp;lt;/sup&amp;gt; party, a security audit should be performed. Good differentiators for available plugins are:&lt;br /&gt;
&lt;br /&gt;
* Publication in the official plugin store at [https://wordpress.org/plugins/ https://wordpress.org/plugins/]&lt;br /&gt;
* User ratings and comments&lt;br /&gt;
* Version number (is it a young plugin/theme or has it faced the challenges of time?)&lt;br /&gt;
* Last update &lt;br /&gt;
* Update frequency &lt;br /&gt;
* Compatibility with the current version of the WordPress core&lt;br /&gt;
&lt;br /&gt;
In order to perform a source code audit, the following tools can be used:&lt;br /&gt;
&lt;br /&gt;
* [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
* [http://www.program-transformation.org/PHP/PhpSat PHP-sat]&lt;br /&gt;
* [http://www.scovetta.com/yasca.html Yasca]&lt;br /&gt;
* [http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ Manual analysis using grep], [https://grepbugs.com/ GrepBugs]&lt;br /&gt;
&lt;br /&gt;
Things to pay extra attention during the source code audit:&lt;br /&gt;
&lt;br /&gt;
* Obfuscated code&lt;br /&gt;
* BASE64 encode function&lt;br /&gt;
* System call functions (exec, passthru, system, shell_exec, etc.)&lt;br /&gt;
* PHP code execution (eval, assert, preg_replace, etc.)&lt;br /&gt;
* Information disclosure functions (phpinfo, getenv, getmygid/pid/uid, etc.)&lt;br /&gt;
* Filesystem functions (fopen, bz/gzopen, chgrp/own/mod, etc.)&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
The backup process is essential. The configuration of the backup process can make the distinction between a clean and fast recovery or a loss of data and prolonged downtime.&lt;br /&gt;
&lt;br /&gt;
What needs to be included in the backup?&lt;br /&gt;
&lt;br /&gt;
* The WordPress Files&lt;br /&gt;
** WordPress Core Installation&lt;br /&gt;
** WordPress Plugins&lt;br /&gt;
** WordPress Themes&lt;br /&gt;
** Images and Files&lt;br /&gt;
** JavaScript and PHP scripts, and other code files&lt;br /&gt;
** Additional Files and Static Web Pages&lt;br /&gt;
* The Database&lt;br /&gt;
&lt;br /&gt;
It’s easy to say that a full backup of the /public_html folder is needed. However there are situations in which this is not feasible nor enough. There are situations in which large quantities of data is generated in the public folder (statistics, temporary data, etc.) that is useless in the backup process. There’s also the situation in which configuration files are placed outside the public directory. They also need backup.&lt;br /&gt;
&lt;br /&gt;
The plan is to identify the files and folders that must be part of the backup process and save these in a remote location.&lt;br /&gt;
&lt;br /&gt;
For database backup, the mysql command line can be used or administrative interfaces like phpMyAdmin. &lt;br /&gt;
&lt;br /&gt;
How often should the backup be performed? It all depends on how often the instance is updated from a content perspective. If there are multiple updates a day, it’s a good idea to have a daily backup. If there’s a new article every several days, than a weekly or monthly backup is the way to go.&lt;br /&gt;
&lt;br /&gt;
It’s a good practice to keep multiple backups and have them time stamped. This is because a breach might not be noticed immediately and a clean recovery can only be performed from a backup which is several iterations old. &lt;br /&gt;
&lt;br /&gt;
Verifying that the backup is functional is part of the process. A backup that does not allow quick and full recovery is useless. The idea is to have a clean server and perform a full recovery from the backup, then check all the functionality and make sure nothing is missing.&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
The steps above are manual and labor intensive. There is a full list of plugins that can help this process: [https://wordpress.org/plugins/tags/backup https://wordpress.org/plugins/tags/backup]&lt;br /&gt;
&lt;br /&gt;
The one free alternative offering full backup capabilities that stands out of the list is [https://wordpress.org/plugins/backwpup/ BackWPup]. The free version can be used to save your complete installation including /wp-content/ and push it to an external Backup Service, like Dropbox, S3, FTP (not a good idea) and many more. &lt;br /&gt;
&lt;br /&gt;
From a security perspective, it’s worth noticing that an attacker who compromised the installation may be able to retrieve credentials and access the remote location of the backups, thus being able to manipulate or delete them. As a good precaution, on the remote side where the backups are stored, an independent process should take the backups and move them to a location inaccessible from the WordPress installation.&lt;br /&gt;
&lt;br /&gt;
== User roles and proper usage ==&lt;br /&gt;
Understanding the roles and properly assigning them to users is essential in the segregation of duties process. &lt;br /&gt;
&lt;br /&gt;
The WordPress roles are:&lt;br /&gt;
&lt;br /&gt;
* Super Admin – somebody with access to the site network administration features and all other features&lt;br /&gt;
* Administrator – somebody who has access to all the administration features within a single site&lt;br /&gt;
* Editor – somebody who can publish and manage posts including the posts of other users&lt;br /&gt;
* Author – somebody who can publish and manage their own posts&lt;br /&gt;
* Contributor – somebody who can write and manage their own posts but cannot publish them&lt;br /&gt;
* Subscriber – somebody who can only manage their profile&lt;br /&gt;
&lt;br /&gt;
The least privilege principle must be considered when assigning roles. &lt;br /&gt;
&lt;br /&gt;
A full list of privileges and a comparison between roles is available at [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/members/ Members Plugin]&lt;br /&gt;
* [https://wordpress.org/plugins/role-scoper/ Role Scoper Plugin]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-access-manager/ User Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/advanced-access-manager/ Advanced Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-role-editor/ User Role Editor]&lt;br /&gt;
&lt;br /&gt;
== Restrict the access to the admin interface ==&lt;br /&gt;
Restricting the access to the admin interface should be considered as no regular user is in need of access to this area. For a site with few users it makes sense to whitelist their IP addresses. Additionally, the access can be restricted only to the localhost and have the users VPN in or create a tunnel to the server (if SSH is enabled) and then access the admin interface.&lt;br /&gt;
&lt;br /&gt;
To restrict the access to the wp-admin folder, a file called .htaccess needs to be created in that folder. The content of the file should be:&lt;br /&gt;
&lt;br /&gt;
''Order Deny,Allow''&lt;br /&gt;
&lt;br /&gt;
''Deny from all''&lt;br /&gt;
&lt;br /&gt;
''Allow from 127.0.0.1''&lt;br /&gt;
&lt;br /&gt;
Multiple IP addresses separated by whitespaces can be added and the use wildcards (*) is permitted.&lt;br /&gt;
&lt;br /&gt;
== Prevent brute-forcing ==&lt;br /&gt;
Brute-forcing is the easy way in for an attacker. As discussed in the General Security chapter, a prerequisite for preventing bruteforcing is to have [https://www.owasp.org/index.php/Authentication_Cheat_Sheet#Password_Complexity strong passwords]. Apart from that, an additional layer of protection can be added in the form of [http://en.wikipedia.org/wiki/CAPTCHA CAPTCHA]. &lt;br /&gt;
&lt;br /&gt;
One good plugin candidate is [https://wordpress.org/plugins/google-captcha/ Google Captcha (reCAPTCHA)]. The advantage of this plugin is that it can be used to add the extra layer of protection on other areas as well (like registration and comments).&lt;br /&gt;
&lt;br /&gt;
CAPTCHA is not a perfect solution by any means. There are services offering real-time CAPTCHA solving for a few cents per challenge. However it takes seconds to solve a CAPTCHA even for a good service like this, thus this sort of attack becomes unfeasible.&lt;br /&gt;
&lt;br /&gt;
Another preventive measure is to lock-out accounts after a series of failed attempts. There is no plugin at the moment that can lock a user after several failed attempts for a period of time, there are plugins blocking IP addresses that are brute-forcing the login mechanism. This approach is not the best when dealing with distributed attacks.&lt;br /&gt;
&lt;br /&gt;
== Implement two factor authentication ==&lt;br /&gt;
To add another layer of security on the authentication mechanism, two factor authentication can be enabled. Two factor authentication is a method of securing accounts requiring that you not only know something (a password) to log in but also that you possess something (your mobile device). The benefit of this approach to security is that even if someone guesses your password, they need to have also stolen your possession in order to break into your account.&lt;br /&gt;
&lt;br /&gt;
Supporting plugin:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/google-authenticator/installation/ Google Authenticator]&lt;br /&gt;
&lt;br /&gt;
== Remove or change the default administrator account ==&lt;br /&gt;
There are two main reasons for creating a new administrator or modifying the old one:&lt;br /&gt;
&lt;br /&gt;
* After the installation the default username is “admin”; an attacker trying to brute-force his way in will try default usernames&lt;br /&gt;
* The default id of the admin account is 1; an attacker who discovers a SQL injection is will try to update the user with id = 1&lt;br /&gt;
&lt;br /&gt;
Both tasks can be performed manually in the database without the need to delete the admin account or can be performed in the administration User Interface. Create a new administrator, log in with the new credentials and delete the default one.&lt;br /&gt;
&lt;br /&gt;
== Disable user registration if not needed ==&lt;br /&gt;
If user management is performed manually or through integration with other user management systems, there is no need for this functionality to be enabled in WordPress.&lt;br /&gt;
&lt;br /&gt;
To disable user registration, log in as an administrator, go to '''Settings -&amp;gt; General''' and make sure the '''“Anyone can register”''' box is unchecked.&lt;br /&gt;
&lt;br /&gt;
== Change the database prefix ==&lt;br /&gt;
In case a 0-day SQL injection vulnerability is discovered, an attacker will try to exploit the known tables from a default WordPress installation. To prevent this from happening, the default prefix of the tables needs to be changed. This can be performed in several ways:&lt;br /&gt;
&lt;br /&gt;
* During the installation process&lt;br /&gt;
* Manually via ''mysql'' command line or ''phpMyAdmin'' for all the tables; after this, the wp-config.php file must be configured to reflect the changes ($table_prefix = &amp;quot;ves1uaq3_&amp;quot;;)&lt;br /&gt;
* With a plugin ([https://wordpress.org/plugins/db-prefix-change/ Change DB Prefix])&lt;br /&gt;
&lt;br /&gt;
== Control comments ==&lt;br /&gt;
WordPress was initially a blogging platform so the ability to add comments was part of the success story. Things changed with the shift of WordPress towards a CMS so comments might not be necessary in all instances. There are several things that need to be considered when dealing with this topic:&lt;br /&gt;
&lt;br /&gt;
* Are comments needed? If not, they should be disabled. Log in as administrator. For new posts go to '''Settings -&amp;gt; Discussion''' and uncheck &amp;quot;'''Allow people to post comments on new articles'''&amp;quot;. For existing posts, go to '''Posts''', select all of them, '''Bulk Actions -&amp;gt; Edit''' and choose “'''do not allow'''” near '''Comments''' before hitting '''Update posts'''.&lt;br /&gt;
* If comments are required, who should be able to post them? If only registered users should be allowed to add comments, go to '''Settings -&amp;gt; Discussion''' and check the “'''Users must be registered and logged in to comment'''” box.&lt;br /&gt;
* Should comments be reviewed before publishing? If so, the “'''Comment must be manually approved'''” box must be checked.&lt;br /&gt;
* If comments are not reviewed before publishing, using an anti-spam plugin like the default [https://wordpress.org/plugins/akismet/ Akismet] is advised &lt;br /&gt;
&lt;br /&gt;
As a general rule of thumb, all the options under '''Settings -&amp;gt; Discussion '''should be carefully reviewed. &lt;br /&gt;
&lt;br /&gt;
== Check file permissions ==&lt;br /&gt;
Permissions on files and directories determine who is allowed to read, write and execute them. Permission settings will vary from situation to situation and between shared hosting and dedicated hosting.&lt;br /&gt;
&lt;br /&gt;
Following is a list of desired permissions on sensitive items and fallback options:&lt;br /&gt;
&lt;br /&gt;
* wp-config.php&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 600, 640&lt;br /&gt;
* uploads folder&lt;br /&gt;
** Desired: 755&lt;br /&gt;
** Fallback: 766, 777 (not recommended)&lt;br /&gt;
* .htaccess files&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 444, 600, 640&lt;br /&gt;
&lt;br /&gt;
== Delete readme.html and install.php ==&lt;br /&gt;
The readme.html file may reveal sensitive information and is not needed from a functional perspective. The install.php is a residue of the installation process and even though it does not allow it to be restarted it’s not needed and should be removed.&lt;br /&gt;
&lt;br /&gt;
Action item:&lt;br /&gt;
&lt;br /&gt;
* Delete the /&amp;lt;WordPress_root&amp;gt;/readme.html and /&amp;lt;WordPress_root&amp;gt;/wp-admin/install.php files&lt;br /&gt;
&lt;br /&gt;
== Add blank index.php files where needed ==&lt;br /&gt;
Especially in shared environments where the settings of the web server are outside the control of the WordPress implementer, directory listing might be enabled. To add an extra layer of security, blank index.php files should be added to the folders that don’t have indexes in order to prevent browsing of the resources. The main folders that need to be considered are:&lt;br /&gt;
&lt;br /&gt;
* wp-includes&lt;br /&gt;
* wp-content&lt;br /&gt;
* wp-content/plugins&lt;br /&gt;
* wp-content/themes&lt;br /&gt;
* wp-content/uploads&lt;br /&gt;
&lt;br /&gt;
== Move wp-config.php file outside the web root folder ==&lt;br /&gt;
The wp-config.php file is a very important configuration file. It contains a lot of sensitive information about your WordPress site, like your database information for example.&lt;br /&gt;
&lt;br /&gt;
WordPress will automatically look for this file in the folder above the WordPress root folder if it does not exist in the root folder. Moving this file out of the public_html folder means the file will not be accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
== Create secret keys ==&lt;br /&gt;
Starting with the release of WordPress 2.6, a new set of security features for passwords and password hashing and cookie security is included. This feature works without doing anything, but it's not particularly powerful without some extra steps. In order to greatly increase the security of the WordPress installation, secret keys must be set up. This should be part of the standard installation process. Whenever there’s suspicion that the secret keys have been compromised, the administrator must change them. Changing the secret keys will invalidate all sessions so users will need to re-authenticate. &lt;br /&gt;
&lt;br /&gt;
Setting up or changing secret keys can be done by adding or editing the following lines to the wp-config.php file, right after the other define statements:&lt;br /&gt;
&lt;br /&gt;
''define('AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('SECURE_AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('LOGGED_IN_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('NONCE_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
You don't have to remember the keys, just make them long, random and complicated -- or better yet, use the [https://api.wordpress.org/secret-key/1.1/salt/ online generator].&lt;br /&gt;
&lt;br /&gt;
== Enforce transport layer encryption for administrative tasks ==&lt;br /&gt;
It was discussed earlier that SSL should be configured and used to access the WordPress instance. Usually sites are available over port 80 and 443. This means that the users are free to choose if they use a clear text or an encrypted communication channel. &lt;br /&gt;
&lt;br /&gt;
In order to force the usage of SSL (at least) for sensitive actions, the following lines must be added to the wp-config.php file:&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_LOGIN', true);''&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_ADMIN', true);''&lt;br /&gt;
&lt;br /&gt;
== Use a Web Application Firewall (WAF) ==&lt;br /&gt;
A WAF should be in place at the web server layer. Because that is not always accessible to the implementer, a WAF plugin can be used to add this layer of protection.&lt;br /&gt;
&lt;br /&gt;
A good plugin candidate is [https://wordpress.org/plugins/ninjafirewall/ NinjaFirewall].&lt;br /&gt;
&lt;br /&gt;
== Security plugins ==&lt;br /&gt;
This section is a list of security plugins and a short description of their functionality. As previously mentioned, the focus is on free plugins.&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/better-wp-security/ iThemes Security] – iThemes Security (formerly Better WP Security) gives you over 30+ ways to secure and protect your WordPress site. In its free version it can obscure, detect, protect and recover a WordPress installation&lt;br /&gt;
* [https://wordpress.org/plugins/bulletproof-security/ BulletProof Security] – the free version offers:&lt;br /&gt;
** .htaccess Website Security Protection (Firewalls)&lt;br /&gt;
** Login Security &amp;amp; Monitoring&lt;br /&gt;
** DB Backup&lt;br /&gt;
** DB Backup Logging&lt;br /&gt;
** DB Table Prefix Changer&lt;br /&gt;
** Security Logging&lt;br /&gt;
** HTTP Error Logging&lt;br /&gt;
** FrontEnd/BackEnd Maintenance Mode&lt;br /&gt;
* [https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/ All In One WP Security &amp;amp; Firewall]&lt;br /&gt;
** User Account/Login/Registration Security&lt;br /&gt;
** Database &amp;amp; File System Security&lt;br /&gt;
** htaccess and wp-config.php File Backup and Restore&lt;br /&gt;
** Blacklist Functionality&lt;br /&gt;
** Firewall Functionality&lt;br /&gt;
** Brute-force login attack prevention&lt;br /&gt;
** Security Scanner&lt;br /&gt;
* [https://wordpress.org/plugins/sucuri-scanner/ Sucuri Security - Auditing, Malware Scanner and Security Hardening]&lt;br /&gt;
** Security Activity Auditing&lt;br /&gt;
** File Integrity Monitoring&lt;br /&gt;
** Remote Malware Scanning&lt;br /&gt;
** Blacklist Monitoring&lt;br /&gt;
** Effective Security Hardening&lt;br /&gt;
** Post-Hack Security Actions&lt;br /&gt;
** Security Notifications&lt;br /&gt;
** Website Firewall (add on)&lt;br /&gt;
* [https://wordpress.org/plugins/wp-security-scan/ Acunetix WP Security] &amp;amp; [https://wordpress.org/plugins/secure-wordpress/faq/ Acunetix Secure WordPress] – these plugins check your WordPress website/blog for security vulnerabilities and suggests corrective actions such as:&lt;br /&gt;
** Passwords&lt;br /&gt;
** File permissions&lt;br /&gt;
** Database security&lt;br /&gt;
** Version hiding&lt;br /&gt;
** WordPress admin protection/security&lt;br /&gt;
** Removes WP Generator META tag from core code&lt;br /&gt;
&lt;br /&gt;
== Disable the Plugin and Theme Editor ==&lt;br /&gt;
Occasionally you may wish to disable the plugin or theme editor to prevent overzealous users from being able to edit sensitive files and potentially crash the site. Disabling these also provides an additional layer of security if a hacker gains access to a well-privileged user account. &lt;br /&gt;
&lt;br /&gt;
Open your wp-config.php file and add the following constant:&lt;br /&gt;
&lt;br /&gt;
''define('DISALLOW_FILE_EDIT',true);''&lt;br /&gt;
&lt;br /&gt;
= Large-scale integration =&lt;br /&gt;
Implementing one WordPress site and maintaining it is a doable job for an administrator. In large corporate environments there may be hundreds of instances that need management, configuration and maintenance. This can easily become an unmanageable situation. When dealing with large number of instances, a centralized approach is needed.&lt;br /&gt;
&lt;br /&gt;
== Creating a standard image ==&lt;br /&gt;
The first step is to create a standard WordPress installation with all the security configuration and plugins in place. This should be a blank installation with no data that can be easily replicated when a new instance needs to be created. &lt;br /&gt;
&lt;br /&gt;
A process for new instances must be in place and approach at least the following subjects:&lt;br /&gt;
&lt;br /&gt;
* General configuration&lt;br /&gt;
* Database connectivity &lt;br /&gt;
* Setting the administrator account&lt;br /&gt;
&lt;br /&gt;
== LDAP integration &amp;amp; Single Sign On ==&lt;br /&gt;
User management for large WordPress sites can be a hassle. In corporate environments users are in general centrally managed and assigned to different groups. WordPress can make use of this already established situation. Whether it’s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or other LDAP compatible service, this establishment is already used in the organization trying to implement WordPress. It’s easy to set up groups based on WordPress roles and assign users to different groups, based on their required level of access. Once the integration is achieved, one can go further towards an elegant solution by implementing Single Sign On. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/active-directory-integration/ Active Directory Integration]&lt;br /&gt;
* [https://wordpress.org/support/plugin/active-directory-sso Active Directory SSO]&lt;br /&gt;
* [https://wordpress.org/plugins/simple-ldap-login/ Simple LDAP Login]&lt;br /&gt;
&lt;br /&gt;
== Multisites ==&lt;br /&gt;
A large environment requires multiple instances of WordPress. Managing each individual instance can become impossible for a single person or a small team. This is where a built-in feature of WordPress comes in handy, [http://codex.wordpress.org/Create_A_Network multisite or network of sites].&lt;br /&gt;
&lt;br /&gt;
A multisite network can be very similar to a personal version of WordPress.com. End users can create their own sites on demand, just like end users of WordPress.com can create blogs on demand. If there’s no need to allow end users to create their own sites on demand, the administrator of the network can create a multisite network in which only he can add new sites.&lt;br /&gt;
&lt;br /&gt;
A multisite network is a collection of sites that all share the same WordPress installation. They can also share plugins and themes. The individual sites in the network are virtual sites in the sense that they do not have their own directories on your server, although they do have separate directories for media uploads within the shared installation, and they do have separate tables in the database.&lt;br /&gt;
&lt;br /&gt;
WordPress does a good job in providing the necessary documentation for:&lt;br /&gt;
&lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network Installation]&lt;br /&gt;
* [http://codex.wordpress.org/Multisite_Network_Administration Administration]&lt;br /&gt;
* [http://codex.wordpress.org/Debugging_a_WordPress_Network Debugging]&lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite Migration]&lt;br /&gt;
&lt;br /&gt;
The benefit of the multisite feature is centralized management of security. Plugins can be checked once for security defects and when a stable and secure version is available it can be pushed to all the sites in the same time.&lt;br /&gt;
&lt;br /&gt;
This built-in solution might not always be the best choice. For example, all the plugins are shared between different sites and the administrators of those sites choose which plugins to enable and which to disable.&lt;br /&gt;
&lt;br /&gt;
== Unified management of multiple installations ==&lt;br /&gt;
If multiple separate instances of WordPress need to be managed centrally, there are several solutions (most of them have at least some form of commercial addons) that can accomplish the task:&lt;br /&gt;
&lt;br /&gt;
* [http://infinitewp.com/ InfinteWP] is a free, self-hosted multiple WordPress management platform that simplifies WordPress management tasks into simple clicks. Features:&lt;br /&gt;
** One master login&lt;br /&gt;
** One click updates&lt;br /&gt;
** Instant backup &amp;amp; restore&lt;br /&gt;
** Plugins &amp;amp; themes management&lt;br /&gt;
* [https://managewp.com/ ManageWP]&lt;br /&gt;
* [https://wpremote.com/ WPRemote] lets administrators monitor an unlimited number of WordPress websites. Through the WP Remote dashboard they can update WordPress and update plugins and themes. A snapshot (backup) of the websites can be downloaded from the interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
The project started with a discussion between [https://www.linkedin.com/in/dancatalinvasile Dan Vasile] (the initiator) and [https://www.linkedin.com/in/andersvinther Anders Vinther] who has already published [http://www.wpsecuritychecklist.com/ a guide] about secure WordPress implementation. Based on the information there, a part of the skeleton and content of the current project was created.&lt;br /&gt;
&lt;br /&gt;
== Browser security ==&lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm]&lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* [http://httpd.apache.org/docs/current/misc/security_tips.html http://httpd.apache.org/docs/current/misc/security_tips.html]&lt;br /&gt;
* [http://www.tecmint.com/apache-security-tips/ http://www.tecmint.com/apache-security-tips/]&lt;br /&gt;
* [https://wiki.debian.org/Apache/Hardening https://wiki.debian.org/Apache/Hardening]&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* [http://php.net/manual/en/security.php http://php.net/manual/en/security.php]&lt;br /&gt;
* [http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html]&lt;br /&gt;
* [http://www.suhosin.org/stories/index.html http://www.suhosin.org/stories/index.html]&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening]&lt;br /&gt;
* [http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips]&lt;br /&gt;
&lt;br /&gt;
== Wordpress ==&lt;br /&gt;
* [http://codex.wordpress.org/Configuring_Automatic_Background_Updates http://codex.wordpress.org/Configuring_Automatic_Background_Updates]&lt;br /&gt;
* [http://stackoverflow.com/questions/3115559/exploitable-php-functions http://stackoverflow.com/questions/3115559/exploitable-php-functions]&lt;br /&gt;
* [http://codex.wordpress.org/WordPress_Backups http://codex.wordpress.org/WordPress_Backups] &lt;br /&gt;
* [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]&lt;br /&gt;
* [http://en.support.wordpress.com/security/two-step-authentication/ http://en.support.wordpress.com/security/two-step-authentication/] &lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network http://codex.wordpress.org/Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Before_You_Create_A_Network http://codex.wordpress.org/Before_You_Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite] &lt;br /&gt;
* [http://codex.wordpress.org/Editing_wp-config.php http://codex.wordpress.org/Editing_wp-config.php]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Wordpress_Security_Checklist_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204932</id>
		<title>OWASP Wordpress Security Implementation Guideline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204932"/>
				<updated>2015-12-09T03:46:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: added secret keys online generator&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Considerations =&lt;br /&gt;
This project aims for a unified approach on WordPress security design and implementation. It is definitely more than a checklist, it's a guide for secure implementation and an invitation to consider and to analyze each individual case. &lt;br /&gt;
&lt;br /&gt;
There is a long list of recommended resources for securing aspects of the WordPress implementation. The project is aimed to offer open source or free resources instead of commercial ones. Some plugins have a free version and a paid one that offers extra functionality. In such cases, the focus of the project was on the free version.&lt;br /&gt;
&lt;br /&gt;
= General security =&lt;br /&gt;
This section is meant to be just a reminder that all the other hardening measures are useless if an attacker can gain access to WordPress users’ computers. We’re not going to spend the time and effort to go into details but rather enumerate the common good practices each security conscious user should have in mind. There are plenty of good resources to help anyone accomplish security basics.&lt;br /&gt;
&lt;br /&gt;
== Device security ==&lt;br /&gt;
When we talk about devices capable of accessing the WordPress administration interface we don’t just talk about computers but mobile devices as well. The following is a list of items that needs to be taken into account when securing the devices that will be accessing the WordPress instances. Some of them may refer to PCs and mobile devices, others just to one of the devices.&lt;br /&gt;
&lt;br /&gt;
* Password protect the device&lt;br /&gt;
* Use strong passwords&lt;br /&gt;
* Keep the OS updated&lt;br /&gt;
* Encrypt the storage&lt;br /&gt;
* Have an anti-virus installed and updated&lt;br /&gt;
* Have a malware/spyware scanner installed and perform regular scans and updates&lt;br /&gt;
* Have a firewall installed and configured &lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm Secure your browser]&lt;br /&gt;
&lt;br /&gt;
= Infrastructure security =&lt;br /&gt;
Before hardening the core of WordPress an implementer must consider hardening the services on which the instance will be installed. Sometimes the underlying infrastructure is not under the control of the implementer. While there are things that can be hardened on WordPress to mitigate things that are supposed to be fixed on the infrastructure side, one should always consider defense in depth. The implementer can contact the infrastructure administrator and ask for specific hardening in order to further protect the applications that will be installed on top of that, in this case WordPress. &lt;br /&gt;
&lt;br /&gt;
The foundation of infrastructure hardening is operating system hardening. This is a broad subject and highly dependent on the OS, the main concerns being around privileges, access control, authentication and logging. It’s a topic outside the coverage of the current project and these are things that must be covered by experienced System Administrators.&lt;br /&gt;
&lt;br /&gt;
WordPress can be installed on a multitude of platforms but the main focus below is on the most common components, Apache and MySQL. The general rules though apply to all supported infrastructure components. &lt;br /&gt;
&lt;br /&gt;
Following best design practices, the tiers of the WordPress instance should be separated. However the presentation and application layers of WordPress are bound together. Thus only one separation is possible, the one with the database. For small applications it’s not a common practice, but for larger sites this becomes a must from a security but also a performance perspective. &lt;br /&gt;
&lt;br /&gt;
As was the case with general security, this is just a list of things that should be performed in order to harden the infrastructure and not the means to do it. &lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable directory listing&lt;br /&gt;
* Secure the communication with the server by generating and using SSL certificates&lt;br /&gt;
* Disable unnecessary modules&lt;br /&gt;
** Good candidates for this are: ''userdir'', ''suexec'', ''cgi/cgid'', ''include'', ''autoindex''&lt;br /&gt;
* Run the daemon as a separate user and group&lt;br /&gt;
* Use ''Allow'' and ''Deny'' to restrict access to directories&lt;br /&gt;
* Use ''mod_security'' module to secure Apache&lt;br /&gt;
* Disable following of ''symbolic links''&lt;br /&gt;
* Turn off server sides includes and CGI execution&lt;br /&gt;
* Limit request size&lt;br /&gt;
* Configure other settings like ''TimeOut'', ''MaxClients'', ''KeepAliveTimeout'', ''LimitRequestFields'', ''LimitRequestFieldSize'' in order to prevent DoS attacks&lt;br /&gt;
* Enable and configure proper logging&lt;br /&gt;
* Modify server banner&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Don’t install PHP as a CGI binary&lt;br /&gt;
* Disable unnecessary PHP modules&lt;br /&gt;
* Disable unused potentially dangerous PHP functions (good examples: ''exec'',''passthru'',''shell_exec'',''system'', etc.)&lt;br /&gt;
* Log errors internally&lt;br /&gt;
* Disable verbose error reporting on the client side&lt;br /&gt;
* Turn off remote code execution (if it’s not needed; the core WordPress doesn’t need this functionality)&lt;br /&gt;
* Disable magic quotes&lt;br /&gt;
* Limit PHP access to file system&lt;br /&gt;
* Protect from DoS&lt;br /&gt;
** Control POST size&lt;br /&gt;
** Limit script time execution&lt;br /&gt;
** Limit memory usage&lt;br /&gt;
* Consider implementing the [http://www.suhosin.org/stories/index.html Suhoshin security extension]&lt;br /&gt;
* Hide the version of PHP in use&lt;br /&gt;
* Hide the .php extension&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
There is an entire [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening OWASP project dedicated to MySQL hardening]. The main action items are:&lt;br /&gt;
&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable or restrict remote access&lt;br /&gt;
* Filesystem access restrictions and ACLs&lt;br /&gt;
* Designing a chroot-jail&lt;br /&gt;
* Encrypting network traffic (this is a must if the database layer is physically separated from the application layer)&lt;br /&gt;
* Encrypting raw databases on filesystem level&lt;br /&gt;
** Redundant if disk encryption is in place at the OS layer&lt;br /&gt;
** However, by using ''dmcrypt'', one can generate an extra layer of encryption&lt;br /&gt;
* Backup encryption&lt;br /&gt;
* Configuration&lt;br /&gt;
** Connectivity: maximum number of concurrent connections and related settings&lt;br /&gt;
** Logging&lt;br /&gt;
** Access control and privilege management&lt;br /&gt;
** Set up root password&lt;br /&gt;
** Rename root account&lt;br /&gt;
** Delete unused users and databases&lt;br /&gt;
** Remove installation history&lt;br /&gt;
&lt;br /&gt;
A PHP security checker is available [https://github.com/sektioneins/pcc here]. This is a one-page php file designed to analyze PHP configuration and rank the findings based on severity.&lt;br /&gt;
&lt;br /&gt;
== Remote access ==&lt;br /&gt;
* Don’t use FTP (use sFTP where possible)&lt;br /&gt;
* If SSH access is available, use [http://linux.die.net/man/1/scp scp] or [http://winscp.net/eng/index.php WinSCP] for file transfer &lt;br /&gt;
* Consider using VPN or [http://www.pentest.ro/ssh-tunnels-an-alternative-to-vpn/ SSH tunnels] to the server for accessing the WordPress administrative interface&lt;br /&gt;
&lt;br /&gt;
= WordPress security =&lt;br /&gt;
There are three main components of WordPress that need to be considered from a security perspective when implementing the solution.&lt;br /&gt;
&lt;br /&gt;
* Core – the basic default installation files that provide most of the functionality &lt;br /&gt;
* Plugins – special written code to improve and extend the basic functionality&lt;br /&gt;
* Theme – the presentation layer which may come with some limited extended functionality&lt;br /&gt;
&lt;br /&gt;
== Updates ==&lt;br /&gt;
It is of vital importance to keep WordPress core, plugins and themes updated. Once an update is released, it needs to be applied as soon as possible to close any security holes. &lt;br /&gt;
&lt;br /&gt;
Functional problems with updates must be considered. It is possible that an update will break some of the functionality so a backup is recommended before updating the core. &lt;br /&gt;
&lt;br /&gt;
=== WordPress Core ===&lt;br /&gt;
The WordPress core has three different types of updates:&lt;br /&gt;
&lt;br /&gt;
* Core development updates, known as the &amp;quot;bleeding edge&amp;quot;&lt;br /&gt;
* Minor core updates, such as maintenance and security releases&lt;br /&gt;
* Major core release updates&lt;br /&gt;
&lt;br /&gt;
Starting with version 3.7, automatic background updates were introduced by default for minor core updates releases (generally security updates). This default behavior can be overridden by editing the wp-config.php file and adding or modifying the following statement&lt;br /&gt;
&lt;br /&gt;
''define( 'WP_AUTO_UPDATE_CORE', true );''&lt;br /&gt;
&lt;br /&gt;
When set to true all updates will be enabled. Translations are updated by default with the minor core updates.&lt;br /&gt;
&lt;br /&gt;
=== Themes and Plugins ===&lt;br /&gt;
The themes and plugins can be updated automatically using filters. The best place to put a filter is in a [http://codex.wordpress.org/Must_Use_Plugins must-use plugin]. WordPress doesn’t recommend putting filters in the wp-config.php file because of conflicts with other parts of the code.&lt;br /&gt;
&lt;br /&gt;
To enable automatic updates for themes and plugins, add the following code&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_plugin', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_theme', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
== Removal of unused plugins and themes ==&lt;br /&gt;
Depending on the server configuration, the files in the WordPress folder can be accessed from the Internet regardless of whether they are used or not. Even if a plugin is disabled, the files are still there and they are accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
When a new vulnerability is discovered, the attackers write scripts to look for the vulnerable files. Knowing the location of vulnerable plugins increases their chances of infiltrating a vulnerable instance. &lt;br /&gt;
&lt;br /&gt;
Any plugins and themes that are not actively used must be deleted. &lt;br /&gt;
&lt;br /&gt;
== Plugins &amp;amp; Themes Security ==&lt;br /&gt;
Plugins and themes are a great addition to the functionality offered by the WordPress core. WordPress’ success is based on these elements. It’s easy to develop a new theme, add new functions with plugins. This ease of development comes with the security downside. In the rush for functionality, the developers often forget about security. Looking at the [https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wordpress CVE list for WordPress] it’s worth noticing that in the past years most of the security defects are affecting the plugins and themes and not WordPress core.&lt;br /&gt;
&lt;br /&gt;
Developing on top of WordPress should be regarded as a regular development job and follow a standard secure development lifecycle. Concrete action items for this chapter include source code review and penetration testing of plugins and themes.&lt;br /&gt;
&lt;br /&gt;
When choosing to use an already developed plugin by a 3&amp;lt;sup&amp;gt;rd&amp;lt;/sup&amp;gt; party, a security audit should be performed. Good differentiators for available plugins are:&lt;br /&gt;
&lt;br /&gt;
* Publication in the official plugin store at [https://wordpress.org/plugins/ https://wordpress.org/plugins/]&lt;br /&gt;
* User ratings and comments&lt;br /&gt;
* Version number (is it a young plugin/theme or has it faced the challenges of time?)&lt;br /&gt;
* Last update &lt;br /&gt;
* Update frequency &lt;br /&gt;
* Compatibility with the current version of the WordPress core&lt;br /&gt;
&lt;br /&gt;
In order to perform a source code audit, the following tools can be used:&lt;br /&gt;
&lt;br /&gt;
* [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
* [http://www.program-transformation.org/PHP/PhpSat PHP-sat]&lt;br /&gt;
* [http://www.scovetta.com/yasca.html Yasca]&lt;br /&gt;
* [http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ Manual analysis using ][http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ grep]&lt;br /&gt;
&lt;br /&gt;
Things to pay extra attention during the source code audit:&lt;br /&gt;
&lt;br /&gt;
* Obfuscated code&lt;br /&gt;
* BASE64 encode function&lt;br /&gt;
* System call functions (exec, passthru, system, shell_exec, etc.)&lt;br /&gt;
* PHP code execution (eval, assert, preg_replace, etc.)&lt;br /&gt;
* Information disclosure functions (phpinfo, getenv, getmygid/pid/uid, etc.)&lt;br /&gt;
* Filesystem functions (fopen, bz/gzopen, chgrp/own/mod, etc.)&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
The backup process is essential. The configuration of the backup process can make the distinction between a clean and fast recovery or a loss of data and prolonged downtime.&lt;br /&gt;
&lt;br /&gt;
What needs to be included in the backup?&lt;br /&gt;
&lt;br /&gt;
* The WordPress Files&lt;br /&gt;
** WordPress Core Installation&lt;br /&gt;
** WordPress Plugins&lt;br /&gt;
** WordPress Themes&lt;br /&gt;
** Images and Files&lt;br /&gt;
** JavaScript and PHP scripts, and other code files&lt;br /&gt;
** Additional Files and Static Web Pages&lt;br /&gt;
* The Database&lt;br /&gt;
&lt;br /&gt;
It’s easy to say that a full backup of the /public_html folder is needed. However there are situations in which this is not feasible nor enough. There are situations in which large quantities of data is generated in the public folder (statistics, temporary data, etc.) that is useless in the backup process. There’s also the situation in which configuration files are placed outside the public directory. They also need backup.&lt;br /&gt;
&lt;br /&gt;
The plan is to identify the files and folders that must be part of the backup process and save these in a remote location.&lt;br /&gt;
&lt;br /&gt;
For database backup, the mysql command line can be used or administrative interfaces like phpMyAdmin. &lt;br /&gt;
&lt;br /&gt;
How often should the backup be performed? It all depends on how often the instance is updated from a content perspective. If there are multiple updates a day, it’s a good idea to have a daily backup. If there’s a new article every several days, than a weekly or monthly backup is the way to go.&lt;br /&gt;
&lt;br /&gt;
It’s a good practice to keep multiple backups and have them time stamped. This is because a breach might not be noticed immediately and a clean recovery can only be performed from a backup which is several iterations old. &lt;br /&gt;
&lt;br /&gt;
Verifying that the backup is functional is part of the process. A backup that does not allow quick and full recovery is useless. The idea is to have a clean server and perform a full recovery from the backup, then check all the functionality and make sure nothing is missing.&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
The steps above are manual and labor intensive. There is a full list of plugins that can help this process: [https://wordpress.org/plugins/tags/backup https://wordpress.org/plugins/tags/backup]&lt;br /&gt;
&lt;br /&gt;
The one free alternative offering full backup capabilities that stands out of the list is [https://wordpress.org/plugins/backwpup/ BackWPup]. The free version can be used to save your complete installation including /wp-content/ and push it to an external Backup Service, like Dropbox, S3, FTP (not a good idea) and many more. &lt;br /&gt;
&lt;br /&gt;
From a security perspective, it’s worth noticing that an attacker who compromised the installation may be able to retrieve credentials and access the remote location of the backups, thus being able to manipulate or delete them. As a good precaution, on the remote side where the backups are stored, an independent process should take the backups and move them to a location inaccessible from the WordPress installation.&lt;br /&gt;
&lt;br /&gt;
== User roles and proper usage ==&lt;br /&gt;
Understanding the roles and properly assigning them to users is essential in the segregation of duties process. &lt;br /&gt;
&lt;br /&gt;
The WordPress roles are:&lt;br /&gt;
&lt;br /&gt;
* Super Admin – somebody with access to the site network administration features and all other features&lt;br /&gt;
* Administrator – somebody who has access to all the administration features within a single site&lt;br /&gt;
* Editor – somebody who can publish and manage posts including the posts of other users&lt;br /&gt;
* Author – somebody who can publish and manage their own posts&lt;br /&gt;
* Contributor – somebody who can write and manage their own posts but cannot publish them&lt;br /&gt;
* Subscriber – somebody who can only manage their profile&lt;br /&gt;
&lt;br /&gt;
The least privilege principle must be considered when assigning roles. &lt;br /&gt;
&lt;br /&gt;
A full list of privileges and a comparison between roles is available at [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/members/ Members Plugin]&lt;br /&gt;
* [https://wordpress.org/plugins/role-scoper/ Role Scoper Plugin]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-access-manager/ User Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/advanced-access-manager/ Advanced Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-role-editor/ User Role Editor]&lt;br /&gt;
&lt;br /&gt;
== Restrict the access to the admin interface ==&lt;br /&gt;
Restricting the access to the admin interface should be considered as no regular user is in need of access to this area. For a site with few users it makes sense to whitelist their IP addresses. Additionally, the access can be restricted only to the localhost and have the users VPN in or create a tunnel to the server (if SSH is enabled) and then access the admin interface.&lt;br /&gt;
&lt;br /&gt;
To restrict the access to the wp-admin folder, a file called .htaccess needs to be created in that folder. The content of the file should be:&lt;br /&gt;
&lt;br /&gt;
''Order Deny,Allow''&lt;br /&gt;
&lt;br /&gt;
''Deny from all''&lt;br /&gt;
&lt;br /&gt;
''Allow from 127.0.0.1''&lt;br /&gt;
&lt;br /&gt;
Multiple IP addresses separated by whitespaces can be added and the use wildcards (*) is permitted.&lt;br /&gt;
&lt;br /&gt;
== Prevent brute-forcing ==&lt;br /&gt;
Brute-forcing is the easy way in for an attacker. As discussed in the General Security chapter, a prerequisite for preventing bruteforcing is to have [https://www.owasp.org/index.php/Authentication_Cheat_Sheet#Password_Complexity strong passwords]. Apart from that, an additional layer of protection can be added in the form of [http://en.wikipedia.org/wiki/CAPTCHA CAPTCHA]. &lt;br /&gt;
&lt;br /&gt;
One good plugin candidate is [https://wordpress.org/plugins/google-captcha/ Google Captcha (reCAPTCHA)]. The advantage of this plugin is that it can be used to add the extra layer of protection on other areas as well (like registration and comments).&lt;br /&gt;
&lt;br /&gt;
CAPTCHA is not a perfect solution by any means. There are services offering real-time CAPTCHA solving for a few cents per challenge. However it takes seconds to solve a CAPTCHA even for a good service like this, thus this sort of attack becomes unfeasible.&lt;br /&gt;
&lt;br /&gt;
Another preventive measure is to lock-out accounts after a series of failed attempts. There is no plugin at the moment that can lock a user after several failed attempts for a period of time, there are plugins blocking IP addresses that are brute-forcing the login mechanism. This approach is not the best when dealing with distributed attacks.&lt;br /&gt;
&lt;br /&gt;
== Implement two factor authentication ==&lt;br /&gt;
To add another layer of security on the authentication mechanism, two factor authentication can be enabled. Two factor authentication is a method of securing accounts requiring that you not only know something (a password) to log in but also that you possess something (your mobile device). The benefit of this approach to security is that even if someone guesses your password, they need to have also stolen your possession in order to break into your account.&lt;br /&gt;
&lt;br /&gt;
Supporting plugin:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/google-authenticator/installation/ Google Authenticator]&lt;br /&gt;
&lt;br /&gt;
== Remove or change the default administrator account ==&lt;br /&gt;
There are two main reasons for creating a new administrator or modifying the old one:&lt;br /&gt;
&lt;br /&gt;
* After the installation the default username is “admin”; an attacker trying to brute-force his way in will try default usernames&lt;br /&gt;
* The default id of the admin account is 1; an attacker who discovers a SQL injection is will try to update the user with id = 1&lt;br /&gt;
&lt;br /&gt;
Both tasks can be performed manually in the database without the need to delete the admin account or can be performed in the administration User Interface. Create a new administrator, log in with the new credentials and delete the default one.&lt;br /&gt;
&lt;br /&gt;
== Disable user registration if not needed ==&lt;br /&gt;
If user management is performed manually or through integration with other user management systems, there is no need for this functionality to be enabled in WordPress.&lt;br /&gt;
&lt;br /&gt;
To disable user registration, log in as an administrator, go to '''Settings -&amp;gt; General''' and make sure the '''“Anyone can register”''' box is unchecked.&lt;br /&gt;
&lt;br /&gt;
== Change the database prefix ==&lt;br /&gt;
In case a 0-day SQL injection vulnerability is discovered, an attacker will try to exploit the known tables from a default WordPress installation. To prevent this from happening, the default prefix of the tables needs to be changed. This can be performed in several ways:&lt;br /&gt;
&lt;br /&gt;
* During the installation process&lt;br /&gt;
* Manually via ''mysql'' command line or ''phpMyAdmin'' for all the tables; after this, the wp-config.php file must be configured to reflect the changes ($table_prefix = &amp;quot;ves1uaq3_&amp;quot;;)&lt;br /&gt;
* With a plugin ([https://wordpress.org/plugins/db-prefix-change/ Change DB Prefix])&lt;br /&gt;
&lt;br /&gt;
== Control comments ==&lt;br /&gt;
WordPress was initially a blogging platform so the ability to add comments was part of the success story. Things changed with the shift of WordPress towards a CMS so comments might not be necessary in all instances. There are several things that need to be considered when dealing with this topic:&lt;br /&gt;
&lt;br /&gt;
* Are comments needed? If not, they should be disabled. Log in as administrator. For new posts go to '''Settings -&amp;gt; Discussion''' and uncheck &amp;quot;'''Allow people to post comments on new articles'''&amp;quot;. For existing posts, go to '''Posts''', select all of them, '''Bulk Actions -&amp;gt; Edit''' and choose “'''do not allow'''” near '''Comments''' before hitting '''Update posts'''.&lt;br /&gt;
* If comments are required, who should be able to post them? If only registered users should be allowed to add comments, go to '''Settings -&amp;gt; Discussion''' and check the “'''Users must be registered and logged in to comment'''” box.&lt;br /&gt;
* Should comments be reviewed before publishing? If so, the “'''Comment must be manually approved'''” box must be checked.&lt;br /&gt;
* If comments are not reviewed before publishing, using an anti-spam plugin like the default [https://wordpress.org/plugins/akismet/ Akismet] is advised &lt;br /&gt;
&lt;br /&gt;
As a general rule of thumb, all the options under '''Settings -&amp;gt; Discussion '''should be carefully reviewed. &lt;br /&gt;
&lt;br /&gt;
== Check file permissions ==&lt;br /&gt;
Permissions on files and directories determine who is allowed to read, write and execute them. Permission settings will vary from situation to situation and between shared hosting and dedicated hosting.&lt;br /&gt;
&lt;br /&gt;
Following is a list of desired permissions on sensitive items and fallback options:&lt;br /&gt;
&lt;br /&gt;
* wp-config.php&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 600, 640&lt;br /&gt;
* uploads folder&lt;br /&gt;
** Desired: 755&lt;br /&gt;
** Fallback: 766, 777 (not recommended)&lt;br /&gt;
* .htaccess files&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 444, 600, 640&lt;br /&gt;
&lt;br /&gt;
== Delete readme.html and install.php ==&lt;br /&gt;
The readme.html file may reveal sensitive information and is not needed from a functional perspective. The install.php is a residue of the installation process and even though it does not allow it to be restarted it’s not needed and should be removed.&lt;br /&gt;
&lt;br /&gt;
Action item:&lt;br /&gt;
&lt;br /&gt;
* Delete the /&amp;lt;WordPress_root&amp;gt;/readme.html and /&amp;lt;WordPress_root&amp;gt;/wp-admin/install.php files&lt;br /&gt;
&lt;br /&gt;
== Add blank index.php files where needed ==&lt;br /&gt;
Especially in shared environments where the settings of the web server are outside the control of the WordPress implementer, directory listing might be enabled. To add an extra layer of security, blank index.php files should be added to the folders that don’t have indexes in order to prevent browsing of the resources. The main folders that need to be considered are:&lt;br /&gt;
&lt;br /&gt;
* wp-includes&lt;br /&gt;
* wp-content&lt;br /&gt;
* wp-content/plugins&lt;br /&gt;
* wp-content/themes&lt;br /&gt;
* wp-content/uploads&lt;br /&gt;
&lt;br /&gt;
== Move wp-config.php file outside the web root folder ==&lt;br /&gt;
The wp-config.php file is a very important configuration file. It contains a lot of sensitive information about your WordPress site, like your database information for example.&lt;br /&gt;
&lt;br /&gt;
WordPress will automatically look for this file in the folder above the WordPress root folder if it does not exist in the root folder. Moving this file out of the public_html folder means the file will not be accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
== Create secret keys ==&lt;br /&gt;
Starting with the release of WordPress 2.6, a new set of security features for passwords and password hashing and cookie security is included. This feature works without doing anything, but it's not particularly powerful without some extra steps. In order to greatly increase the security of the WordPress installation, secret keys must be set up. This should be part of the standard installation process. Whenever there’s suspicion that the secret keys have been compromised, the administrator must change them. Changing the secret keys will invalidate all sessions so users will need to re-authenticate. &lt;br /&gt;
&lt;br /&gt;
Setting up or changing secret keys can be done by adding or editing the following lines to the wp-config.php file, right after the other define statements:&lt;br /&gt;
&lt;br /&gt;
''define('AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('SECURE_AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('LOGGED_IN_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('NONCE_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
You don't have to remember the keys, just make them long, random and complicated -- or better yet, use the [https://api.wordpress.org/secret-key/1.1/salt/ online generator].&lt;br /&gt;
&lt;br /&gt;
== Enforce transport layer encryption for administrative tasks ==&lt;br /&gt;
It was discussed earlier that SSL should be configured and used to access the WordPress instance. Usually sites are available over port 80 and 443. This means that the users are free to choose if they use a clear text or an encrypted communication channel. &lt;br /&gt;
&lt;br /&gt;
In order to force the usage of SSL (at least) for sensitive actions, the following lines must be added to the wp-config.php file:&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_LOGIN', true);''&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_ADMIN', true);''&lt;br /&gt;
&lt;br /&gt;
== Use a Web Application Firewall (WAF) ==&lt;br /&gt;
A WAF should be in place at the web server layer. Because that is not always accessible to the implementer, a WAF plugin can be used to add this layer of protection.&lt;br /&gt;
&lt;br /&gt;
A good plugin candidate is [https://wordpress.org/plugins/ninjafirewall/ NinjaFirewall].&lt;br /&gt;
&lt;br /&gt;
== Security plugins ==&lt;br /&gt;
This section is a list of security plugins and a short description of their functionality. As previously mentioned, the focus is on free plugins.&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/better-wp-security/ iThemes Security] – iThemes Security (formerly Better WP Security) gives you over 30+ ways to secure and protect your WordPress site. In its free version it can obscure, detect, protect and recover a WordPress installation&lt;br /&gt;
* [https://wordpress.org/plugins/bulletproof-security/ BulletProof Security] – the free version offers:&lt;br /&gt;
** .htaccess Website Security Protection (Firewalls)&lt;br /&gt;
** Login Security &amp;amp; Monitoring&lt;br /&gt;
** DB Backup&lt;br /&gt;
** DB Backup Logging&lt;br /&gt;
** DB Table Prefix Changer&lt;br /&gt;
** Security Logging&lt;br /&gt;
** HTTP Error Logging&lt;br /&gt;
** FrontEnd/BackEnd Maintenance Mode&lt;br /&gt;
* [https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/ All In One WP Security &amp;amp; Firewall]&lt;br /&gt;
** User Account/Login/Registration Security&lt;br /&gt;
** Database &amp;amp; File System Security&lt;br /&gt;
** htaccess and wp-config.php File Backup and Restore&lt;br /&gt;
** Blacklist Functionality&lt;br /&gt;
** Firewall Functionality&lt;br /&gt;
** Brute-force login attack prevention&lt;br /&gt;
** Security Scanner&lt;br /&gt;
* [https://wordpress.org/plugins/sucuri-scanner/ Sucuri Security - Auditing, Malware Scanner and Security Hardening]&lt;br /&gt;
** Security Activity Auditing&lt;br /&gt;
** File Integrity Monitoring&lt;br /&gt;
** Remote Malware Scanning&lt;br /&gt;
** Blacklist Monitoring&lt;br /&gt;
** Effective Security Hardening&lt;br /&gt;
** Post-Hack Security Actions&lt;br /&gt;
** Security Notifications&lt;br /&gt;
** Website Firewall (add on)&lt;br /&gt;
* [https://wordpress.org/plugins/wp-security-scan/ Acunetix WP Security] &amp;amp; [https://wordpress.org/plugins/secure-wordpress/faq/ Acunetix Secure WordPress] – these plugins check your WordPress website/blog for security vulnerabilities and suggests corrective actions such as:&lt;br /&gt;
** Passwords&lt;br /&gt;
** File permissions&lt;br /&gt;
** Database security&lt;br /&gt;
** Version hiding&lt;br /&gt;
** WordPress admin protection/security&lt;br /&gt;
** Removes WP Generator META tag from core code&lt;br /&gt;
&lt;br /&gt;
== Disable the Plugin and Theme Editor ==&lt;br /&gt;
Occasionally you may wish to disable the plugin or theme editor to prevent overzealous users from being able to edit sensitive files and potentially crash the site. Disabling these also provides an additional layer of security if a hacker gains access to a well-privileged user account. &lt;br /&gt;
&lt;br /&gt;
Open your wp-config.php file and add the following constant:&lt;br /&gt;
&lt;br /&gt;
''define('DISALLOW_FILE_EDIT',true);''&lt;br /&gt;
&lt;br /&gt;
= Large-scale integration =&lt;br /&gt;
Implementing one WordPress site and maintaining it is a doable job for an administrator. In large corporate environments there may be hundreds of instances that need management, configuration and maintenance. This can easily become an unmanageable situation. When dealing with large number of instances, a centralized approach is needed.&lt;br /&gt;
&lt;br /&gt;
== Creating a standard image ==&lt;br /&gt;
The first step is to create a standard WordPress installation with all the security configuration and plugins in place. This should be a blank installation with no data that can be easily replicated when a new instance needs to be created. &lt;br /&gt;
&lt;br /&gt;
A process for new instances must be in place and approach at least the following subjects:&lt;br /&gt;
&lt;br /&gt;
* General configuration&lt;br /&gt;
* Database connectivity &lt;br /&gt;
* Setting the administrator account&lt;br /&gt;
&lt;br /&gt;
== LDAP integration &amp;amp; Single Sign On ==&lt;br /&gt;
User management for large WordPress sites can be a hassle. In corporate environments users are in general centrally managed and assigned to different groups. WordPress can make use of this already established situation. Whether it’s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or other LDAP compatible service, this establishment is already used in the organization trying to implement WordPress. It’s easy to set up groups based on WordPress roles and assign users to different groups, based on their required level of access. Once the integration is achieved, one can go further towards an elegant solution by implementing Single Sign On. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/active-directory-integration/ Active Directory Integration]&lt;br /&gt;
* [https://wordpress.org/support/plugin/active-directory-sso Active Directory SSO]&lt;br /&gt;
* [https://wordpress.org/plugins/simple-ldap-login/ Simple LDAP Login]&lt;br /&gt;
&lt;br /&gt;
== Multisites ==&lt;br /&gt;
A large environment requires multiple instances of WordPress. Managing each individual instance can become impossible for a single person or a small team. This is where a built-in feature of WordPress comes in handy, [http://codex.wordpress.org/Create_A_Network multisite or network of sites].&lt;br /&gt;
&lt;br /&gt;
A multisite network can be very similar to a personal version of WordPress.com. End users can create their own sites on demand, just like end users of WordPress.com can create blogs on demand. If there’s no need to allow end users to create their own sites on demand, the administrator of the network can create a multisite network in which only he can add new sites.&lt;br /&gt;
&lt;br /&gt;
A multisite network is a collection of sites that all share the same WordPress installation. They can also share plugins and themes. The individual sites in the network are virtual sites in the sense that they do not have their own directories on your server, although they do have separate directories for media uploads within the shared installation, and they do have separate tables in the database.&lt;br /&gt;
&lt;br /&gt;
WordPress does a good job in providing the necessary documentation for:&lt;br /&gt;
&lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network Installation]&lt;br /&gt;
* [http://codex.wordpress.org/Multisite_Network_Administration Administration]&lt;br /&gt;
* [http://codex.wordpress.org/Debugging_a_WordPress_Network Debugging]&lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite Migration]&lt;br /&gt;
&lt;br /&gt;
The benefit of the multisite feature is centralized management of security. Plugins can be checked once for security defects and when a stable and secure version is available it can be pushed to all the sites in the same time.&lt;br /&gt;
&lt;br /&gt;
This built-in solution might not always be the best choice. For example, all the plugins are shared between different sites and the administrators of those sites choose which plugins to enable and which to disable.&lt;br /&gt;
&lt;br /&gt;
== Unified management of multiple installations ==&lt;br /&gt;
If multiple separate instances of WordPress need to be managed centrally, there are several solutions (most of them have at least some form of commercial addons) that can accomplish the task:&lt;br /&gt;
&lt;br /&gt;
* [http://infinitewp.com/ InfinteWP] is a free, self-hosted multiple WordPress management platform that simplifies WordPress management tasks into simple clicks. Features:&lt;br /&gt;
** One master login&lt;br /&gt;
** One click updates&lt;br /&gt;
** Instant backup &amp;amp; restore&lt;br /&gt;
** Plugins &amp;amp; themes management&lt;br /&gt;
* [https://managewp.com/ ManageWP]&lt;br /&gt;
* [https://wpremote.com/ WPRemote] lets administrators monitor an unlimited number of WordPress websites. Through the WP Remote dashboard they can update WordPress and update plugins and themes. A snapshot (backup) of the websites can be downloaded from the interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
The project started with a discussion between [https://www.linkedin.com/in/dancatalinvasile Dan Vasile] (the initiator) and [https://www.linkedin.com/in/andersvinther Anders Vinther] who has already published [http://www.wpsecuritychecklist.com/ a guide] about secure WordPress implementation. Based on the information there, a part of the skeleton and content of the current project was created.&lt;br /&gt;
&lt;br /&gt;
== Browser security ==&lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm]&lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* [http://httpd.apache.org/docs/current/misc/security_tips.html http://httpd.apache.org/docs/current/misc/security_tips.html]&lt;br /&gt;
* [http://www.tecmint.com/apache-security-tips/ http://www.tecmint.com/apache-security-tips/]&lt;br /&gt;
* [https://wiki.debian.org/Apache/Hardening https://wiki.debian.org/Apache/Hardening]&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* [http://php.net/manual/en/security.php http://php.net/manual/en/security.php]&lt;br /&gt;
* [http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html]&lt;br /&gt;
* [http://www.suhosin.org/stories/index.html http://www.suhosin.org/stories/index.html]&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening]&lt;br /&gt;
* [http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips]&lt;br /&gt;
&lt;br /&gt;
== Wordpress ==&lt;br /&gt;
* [http://codex.wordpress.org/Configuring_Automatic_Background_Updates http://codex.wordpress.org/Configuring_Automatic_Background_Updates]&lt;br /&gt;
* [http://stackoverflow.com/questions/3115559/exploitable-php-functions http://stackoverflow.com/questions/3115559/exploitable-php-functions]&lt;br /&gt;
* [http://codex.wordpress.org/WordPress_Backups http://codex.wordpress.org/WordPress_Backups] &lt;br /&gt;
* [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]&lt;br /&gt;
* [http://en.support.wordpress.com/security/two-step-authentication/ http://en.support.wordpress.com/security/two-step-authentication/] &lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network http://codex.wordpress.org/Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Before_You_Create_A_Network http://codex.wordpress.org/Before_You_Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite] &lt;br /&gt;
* [http://codex.wordpress.org/Editing_wp-config.php http://codex.wordpress.org/Editing_wp-config.php]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Wordpress_Security_Checklist_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204931</id>
		<title>OWASP Wordpress Security Implementation Guideline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204931"/>
				<updated>2015-12-09T03:42:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: added official editing wp-config.php tips link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Considerations =&lt;br /&gt;
This project aims for a unified approach on WordPress security design and implementation. It is definitely more than a checklist, it's a guide for secure implementation and an invitation to consider and to analyze each individual case. &lt;br /&gt;
&lt;br /&gt;
There is a long list of recommended resources for securing aspects of the WordPress implementation. The project is aimed to offer open source or free resources instead of commercial ones. Some plugins have a free version and a paid one that offers extra functionality. In such cases, the focus of the project was on the free version.&lt;br /&gt;
&lt;br /&gt;
= General security =&lt;br /&gt;
This section is meant to be just a reminder that all the other hardening measures are useless if an attacker can gain access to WordPress users’ computers. We’re not going to spend the time and effort to go into details but rather enumerate the common good practices each security conscious user should have in mind. There are plenty of good resources to help anyone accomplish security basics.&lt;br /&gt;
&lt;br /&gt;
== Device security ==&lt;br /&gt;
When we talk about devices capable of accessing the WordPress administration interface we don’t just talk about computers but mobile devices as well. The following is a list of items that needs to be taken into account when securing the devices that will be accessing the WordPress instances. Some of them may refer to PCs and mobile devices, others just to one of the devices.&lt;br /&gt;
&lt;br /&gt;
* Password protect the device&lt;br /&gt;
* Use strong passwords&lt;br /&gt;
* Keep the OS updated&lt;br /&gt;
* Encrypt the storage&lt;br /&gt;
* Have an anti-virus installed and updated&lt;br /&gt;
* Have a malware/spyware scanner installed and perform regular scans and updates&lt;br /&gt;
* Have a firewall installed and configured &lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm Secure your browser]&lt;br /&gt;
&lt;br /&gt;
= Infrastructure security =&lt;br /&gt;
Before hardening the core of WordPress an implementer must consider hardening the services on which the instance will be installed. Sometimes the underlying infrastructure is not under the control of the implementer. While there are things that can be hardened on WordPress to mitigate things that are supposed to be fixed on the infrastructure side, one should always consider defense in depth. The implementer can contact the infrastructure administrator and ask for specific hardening in order to further protect the applications that will be installed on top of that, in this case WordPress. &lt;br /&gt;
&lt;br /&gt;
The foundation of infrastructure hardening is operating system hardening. This is a broad subject and highly dependent on the OS, the main concerns being around privileges, access control, authentication and logging. It’s a topic outside the coverage of the current project and these are things that must be covered by experienced System Administrators.&lt;br /&gt;
&lt;br /&gt;
WordPress can be installed on a multitude of platforms but the main focus below is on the most common components, Apache and MySQL. The general rules though apply to all supported infrastructure components. &lt;br /&gt;
&lt;br /&gt;
Following best design practices, the tiers of the WordPress instance should be separated. However the presentation and application layers of WordPress are bound together. Thus only one separation is possible, the one with the database. For small applications it’s not a common practice, but for larger sites this becomes a must from a security but also a performance perspective. &lt;br /&gt;
&lt;br /&gt;
As was the case with general security, this is just a list of things that should be performed in order to harden the infrastructure and not the means to do it. &lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable directory listing&lt;br /&gt;
* Secure the communication with the server by generating and using SSL certificates&lt;br /&gt;
* Disable unnecessary modules&lt;br /&gt;
** Good candidates for this are: ''userdir'', ''suexec'', ''cgi/cgid'', ''include'', ''autoindex''&lt;br /&gt;
* Run the daemon as a separate user and group&lt;br /&gt;
* Use ''Allow'' and ''Deny'' to restrict access to directories&lt;br /&gt;
* Use ''mod_security'' module to secure Apache&lt;br /&gt;
* Disable following of ''symbolic links''&lt;br /&gt;
* Turn off server sides includes and CGI execution&lt;br /&gt;
* Limit request size&lt;br /&gt;
* Configure other settings like ''TimeOut'', ''MaxClients'', ''KeepAliveTimeout'', ''LimitRequestFields'', ''LimitRequestFieldSize'' in order to prevent DoS attacks&lt;br /&gt;
* Enable and configure proper logging&lt;br /&gt;
* Modify server banner&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Don’t install PHP as a CGI binary&lt;br /&gt;
* Disable unnecessary PHP modules&lt;br /&gt;
* Disable unused potentially dangerous PHP functions (good examples: ''exec'',''passthru'',''shell_exec'',''system'', etc.)&lt;br /&gt;
* Log errors internally&lt;br /&gt;
* Disable verbose error reporting on the client side&lt;br /&gt;
* Turn off remote code execution (if it’s not needed; the core WordPress doesn’t need this functionality)&lt;br /&gt;
* Disable magic quotes&lt;br /&gt;
* Limit PHP access to file system&lt;br /&gt;
* Protect from DoS&lt;br /&gt;
** Control POST size&lt;br /&gt;
** Limit script time execution&lt;br /&gt;
** Limit memory usage&lt;br /&gt;
* Consider implementing the [http://www.suhosin.org/stories/index.html Suhoshin security extension]&lt;br /&gt;
* Hide the version of PHP in use&lt;br /&gt;
* Hide the .php extension&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
There is an entire [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening OWASP project dedicated to MySQL hardening]. The main action items are:&lt;br /&gt;
&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable or restrict remote access&lt;br /&gt;
* Filesystem access restrictions and ACLs&lt;br /&gt;
* Designing a chroot-jail&lt;br /&gt;
* Encrypting network traffic (this is a must if the database layer is physically separated from the application layer)&lt;br /&gt;
* Encrypting raw databases on filesystem level&lt;br /&gt;
** Redundant if disk encryption is in place at the OS layer&lt;br /&gt;
** However, by using ''dmcrypt'', one can generate an extra layer of encryption&lt;br /&gt;
* Backup encryption&lt;br /&gt;
* Configuration&lt;br /&gt;
** Connectivity: maximum number of concurrent connections and related settings&lt;br /&gt;
** Logging&lt;br /&gt;
** Access control and privilege management&lt;br /&gt;
** Set up root password&lt;br /&gt;
** Rename root account&lt;br /&gt;
** Delete unused users and databases&lt;br /&gt;
** Remove installation history&lt;br /&gt;
&lt;br /&gt;
A PHP security checker is available [https://github.com/sektioneins/pcc here]. This is a one-page php file designed to analyze PHP configuration and rank the findings based on severity.&lt;br /&gt;
&lt;br /&gt;
== Remote access ==&lt;br /&gt;
* Don’t use FTP (use sFTP where possible)&lt;br /&gt;
* If SSH access is available, use [http://linux.die.net/man/1/scp scp] or [http://winscp.net/eng/index.php WinSCP] for file transfer &lt;br /&gt;
* Consider using VPN or [http://www.pentest.ro/ssh-tunnels-an-alternative-to-vpn/ SSH tunnels] to the server for accessing the WordPress administrative interface&lt;br /&gt;
&lt;br /&gt;
= WordPress security =&lt;br /&gt;
There are three main components of WordPress that need to be considered from a security perspective when implementing the solution.&lt;br /&gt;
&lt;br /&gt;
* Core – the basic default installation files that provide most of the functionality &lt;br /&gt;
* Plugins – special written code to improve and extend the basic functionality&lt;br /&gt;
* Theme – the presentation layer which may come with some limited extended functionality&lt;br /&gt;
&lt;br /&gt;
== Updates ==&lt;br /&gt;
It is of vital importance to keep WordPress core, plugins and themes updated. Once an update is released, it needs to be applied as soon as possible to close any security holes. &lt;br /&gt;
&lt;br /&gt;
Functional problems with updates must be considered. It is possible that an update will break some of the functionality so a backup is recommended before updating the core. &lt;br /&gt;
&lt;br /&gt;
=== WordPress Core ===&lt;br /&gt;
The WordPress core has three different types of updates:&lt;br /&gt;
&lt;br /&gt;
* Core development updates, known as the &amp;quot;bleeding edge&amp;quot;&lt;br /&gt;
* Minor core updates, such as maintenance and security releases&lt;br /&gt;
* Major core release updates&lt;br /&gt;
&lt;br /&gt;
Starting with version 3.7, automatic background updates were introduced by default for minor core updates releases (generally security updates). This default behavior can be overridden by editing the wp-config.php file and adding or modifying the following statement&lt;br /&gt;
&lt;br /&gt;
''define( 'WP_AUTO_UPDATE_CORE', true );''&lt;br /&gt;
&lt;br /&gt;
When set to true all updates will be enabled. Translations are updated by default with the minor core updates.&lt;br /&gt;
&lt;br /&gt;
=== Themes and Plugins ===&lt;br /&gt;
The themes and plugins can be updated automatically using filters. The best place to put a filter is in a [http://codex.wordpress.org/Must_Use_Plugins must-use plugin]. WordPress doesn’t recommend putting filters in the wp-config.php file because of conflicts with other parts of the code.&lt;br /&gt;
&lt;br /&gt;
To enable automatic updates for themes and plugins, add the following code&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_plugin', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_theme', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
== Removal of unused plugins and themes ==&lt;br /&gt;
Depending on the server configuration, the files in the WordPress folder can be accessed from the Internet regardless of whether they are used or not. Even if a plugin is disabled, the files are still there and they are accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
When a new vulnerability is discovered, the attackers write scripts to look for the vulnerable files. Knowing the location of vulnerable plugins increases their chances of infiltrating a vulnerable instance. &lt;br /&gt;
&lt;br /&gt;
Any plugins and themes that are not actively used must be deleted. &lt;br /&gt;
&lt;br /&gt;
== Plugins &amp;amp; Themes Security ==&lt;br /&gt;
Plugins and themes are a great addition to the functionality offered by the WordPress core. WordPress’ success is based on these elements. It’s easy to develop a new theme, add new functions with plugins. This ease of development comes with the security downside. In the rush for functionality, the developers often forget about security. Looking at the [https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wordpress CVE list for WordPress] it’s worth noticing that in the past years most of the security defects are affecting the plugins and themes and not WordPress core.&lt;br /&gt;
&lt;br /&gt;
Developing on top of WordPress should be regarded as a regular development job and follow a standard secure development lifecycle. Concrete action items for this chapter include source code review and penetration testing of plugins and themes.&lt;br /&gt;
&lt;br /&gt;
When choosing to use an already developed plugin by a 3&amp;lt;sup&amp;gt;rd&amp;lt;/sup&amp;gt; party, a security audit should be performed. Good differentiators for available plugins are:&lt;br /&gt;
&lt;br /&gt;
* Publication in the official plugin store at [https://wordpress.org/plugins/ https://wordpress.org/plugins/]&lt;br /&gt;
* User ratings and comments&lt;br /&gt;
* Version number (is it a young plugin/theme or has it faced the challenges of time?)&lt;br /&gt;
* Last update &lt;br /&gt;
* Update frequency &lt;br /&gt;
* Compatibility with the current version of the WordPress core&lt;br /&gt;
&lt;br /&gt;
In order to perform a source code audit, the following tools can be used:&lt;br /&gt;
&lt;br /&gt;
* [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
* [http://www.program-transformation.org/PHP/PhpSat PHP-sat]&lt;br /&gt;
* [http://www.scovetta.com/yasca.html Yasca]&lt;br /&gt;
* [http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ Manual analysis using ][http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ grep]&lt;br /&gt;
&lt;br /&gt;
Things to pay extra attention during the source code audit:&lt;br /&gt;
&lt;br /&gt;
* Obfuscated code&lt;br /&gt;
* BASE64 encode function&lt;br /&gt;
* System call functions (exec, passthru, system, shell_exec, etc.)&lt;br /&gt;
* PHP code execution (eval, assert, preg_replace, etc.)&lt;br /&gt;
* Information disclosure functions (phpinfo, getenv, getmygid/pid/uid, etc.)&lt;br /&gt;
* Filesystem functions (fopen, bz/gzopen, chgrp/own/mod, etc.)&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
The backup process is essential. The configuration of the backup process can make the distinction between a clean and fast recovery or a loss of data and prolonged downtime.&lt;br /&gt;
&lt;br /&gt;
What needs to be included in the backup?&lt;br /&gt;
&lt;br /&gt;
* The WordPress Files&lt;br /&gt;
** WordPress Core Installation&lt;br /&gt;
** WordPress Plugins&lt;br /&gt;
** WordPress Themes&lt;br /&gt;
** Images and Files&lt;br /&gt;
** JavaScript and PHP scripts, and other code files&lt;br /&gt;
** Additional Files and Static Web Pages&lt;br /&gt;
* The Database&lt;br /&gt;
&lt;br /&gt;
It’s easy to say that a full backup of the /public_html folder is needed. However there are situations in which this is not feasible nor enough. There are situations in which large quantities of data is generated in the public folder (statistics, temporary data, etc.) that is useless in the backup process. There’s also the situation in which configuration files are placed outside the public directory. They also need backup.&lt;br /&gt;
&lt;br /&gt;
The plan is to identify the files and folders that must be part of the backup process and save these in a remote location.&lt;br /&gt;
&lt;br /&gt;
For database backup, the mysql command line can be used or administrative interfaces like phpMyAdmin. &lt;br /&gt;
&lt;br /&gt;
How often should the backup be performed? It all depends on how often the instance is updated from a content perspective. If there are multiple updates a day, it’s a good idea to have a daily backup. If there’s a new article every several days, than a weekly or monthly backup is the way to go.&lt;br /&gt;
&lt;br /&gt;
It’s a good practice to keep multiple backups and have them time stamped. This is because a breach might not be noticed immediately and a clean recovery can only be performed from a backup which is several iterations old. &lt;br /&gt;
&lt;br /&gt;
Verifying that the backup is functional is part of the process. A backup that does not allow quick and full recovery is useless. The idea is to have a clean server and perform a full recovery from the backup, then check all the functionality and make sure nothing is missing.&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
The steps above are manual and labor intensive. There is a full list of plugins that can help this process: [https://wordpress.org/plugins/tags/backup https://wordpress.org/plugins/tags/backup]&lt;br /&gt;
&lt;br /&gt;
The one free alternative offering full backup capabilities that stands out of the list is [https://wordpress.org/plugins/backwpup/ BackWPup]. The free version can be used to save your complete installation including /wp-content/ and push it to an external Backup Service, like Dropbox, S3, FTP (not a good idea) and many more. &lt;br /&gt;
&lt;br /&gt;
From a security perspective, it’s worth noticing that an attacker who compromised the installation may be able to retrieve credentials and access the remote location of the backups, thus being able to manipulate or delete them. As a good precaution, on the remote side where the backups are stored, an independent process should take the backups and move them to a location inaccessible from the WordPress installation.&lt;br /&gt;
&lt;br /&gt;
== User roles and proper usage ==&lt;br /&gt;
Understanding the roles and properly assigning them to users is essential in the segregation of duties process. &lt;br /&gt;
&lt;br /&gt;
The WordPress roles are:&lt;br /&gt;
&lt;br /&gt;
* Super Admin – somebody with access to the site network administration features and all other features&lt;br /&gt;
* Administrator – somebody who has access to all the administration features within a single site&lt;br /&gt;
* Editor – somebody who can publish and manage posts including the posts of other users&lt;br /&gt;
* Author – somebody who can publish and manage their own posts&lt;br /&gt;
* Contributor – somebody who can write and manage their own posts but cannot publish them&lt;br /&gt;
* Subscriber – somebody who can only manage their profile&lt;br /&gt;
&lt;br /&gt;
The least privilege principle must be considered when assigning roles. &lt;br /&gt;
&lt;br /&gt;
A full list of privileges and a comparison between roles is available at [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/members/ Members Plugin]&lt;br /&gt;
* [https://wordpress.org/plugins/role-scoper/ Role Scoper Plugin]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-access-manager/ User Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/advanced-access-manager/ Advanced Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-role-editor/ User Role Editor]&lt;br /&gt;
&lt;br /&gt;
== Restrict the access to the admin interface ==&lt;br /&gt;
Restricting the access to the admin interface should be considered as no regular user is in need of access to this area. For a site with few users it makes sense to whitelist their IP addresses. Additionally, the access can be restricted only to the localhost and have the users VPN in or create a tunnel to the server (if SSH is enabled) and then access the admin interface.&lt;br /&gt;
&lt;br /&gt;
To restrict the access to the wp-admin folder, a file called .htaccess needs to be created in that folder. The content of the file should be:&lt;br /&gt;
&lt;br /&gt;
''Order Deny,Allow''&lt;br /&gt;
&lt;br /&gt;
''Deny from all''&lt;br /&gt;
&lt;br /&gt;
''Allow from 127.0.0.1''&lt;br /&gt;
&lt;br /&gt;
Multiple IP addresses separated by whitespaces can be added and the use wildcards (*) is permitted.&lt;br /&gt;
&lt;br /&gt;
== Prevent brute-forcing ==&lt;br /&gt;
Brute-forcing is the easy way in for an attacker. As discussed in the General Security chapter, a prerequisite for preventing bruteforcing is to have [https://www.owasp.org/index.php/Authentication_Cheat_Sheet#Password_Complexity strong passwords]. Apart from that, an additional layer of protection can be added in the form of [http://en.wikipedia.org/wiki/CAPTCHA CAPTCHA]. &lt;br /&gt;
&lt;br /&gt;
One good plugin candidate is [https://wordpress.org/plugins/google-captcha/ Google Captcha (reCAPTCHA)]. The advantage of this plugin is that it can be used to add the extra layer of protection on other areas as well (like registration and comments).&lt;br /&gt;
&lt;br /&gt;
CAPTCHA is not a perfect solution by any means. There are services offering real-time CAPTCHA solving for a few cents per challenge. However it takes seconds to solve a CAPTCHA even for a good service like this, thus this sort of attack becomes unfeasible.&lt;br /&gt;
&lt;br /&gt;
Another preventive measure is to lock-out accounts after a series of failed attempts. There is no plugin at the moment that can lock a user after several failed attempts for a period of time, there are plugins blocking IP addresses that are brute-forcing the login mechanism. This approach is not the best when dealing with distributed attacks.&lt;br /&gt;
&lt;br /&gt;
== Implement two factor authentication ==&lt;br /&gt;
To add another layer of security on the authentication mechanism, two factor authentication can be enabled. Two factor authentication is a method of securing accounts requiring that you not only know something (a password) to log in but also that you possess something (your mobile device). The benefit of this approach to security is that even if someone guesses your password, they need to have also stolen your possession in order to break into your account.&lt;br /&gt;
&lt;br /&gt;
Supporting plugin:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/google-authenticator/installation/ Google Authenticator]&lt;br /&gt;
&lt;br /&gt;
== Remove or change the default administrator account ==&lt;br /&gt;
There are two main reasons for creating a new administrator or modifying the old one:&lt;br /&gt;
&lt;br /&gt;
* After the installation the default username is “admin”; an attacker trying to brute-force his way in will try default usernames&lt;br /&gt;
* The default id of the admin account is 1; an attacker who discovers a SQL injection is will try to update the user with id = 1&lt;br /&gt;
&lt;br /&gt;
Both tasks can be performed manually in the database without the need to delete the admin account or can be performed in the administration User Interface. Create a new administrator, log in with the new credentials and delete the default one.&lt;br /&gt;
&lt;br /&gt;
== Disable user registration if not needed ==&lt;br /&gt;
If user management is performed manually or through integration with other user management systems, there is no need for this functionality to be enabled in WordPress.&lt;br /&gt;
&lt;br /&gt;
To disable user registration, log in as an administrator, go to '''Settings -&amp;gt; General''' and make sure the '''“Anyone can register”''' box is unchecked.&lt;br /&gt;
&lt;br /&gt;
== Change the database prefix ==&lt;br /&gt;
In case a 0-day SQL injection vulnerability is discovered, an attacker will try to exploit the known tables from a default WordPress installation. To prevent this from happening, the default prefix of the tables needs to be changed. This can be performed in several ways:&lt;br /&gt;
&lt;br /&gt;
* During the installation process&lt;br /&gt;
* Manually via ''mysql'' command line or ''phpMyAdmin'' for all the tables; after this, the wp-config.php file must be configured to reflect the changes ($table_prefix = &amp;quot;ves1uaq3_&amp;quot;;)&lt;br /&gt;
* With a plugin ([https://wordpress.org/plugins/db-prefix-change/ Change DB Prefix])&lt;br /&gt;
&lt;br /&gt;
== Control comments ==&lt;br /&gt;
WordPress was initially a blogging platform so the ability to add comments was part of the success story. Things changed with the shift of WordPress towards a CMS so comments might not be necessary in all instances. There are several things that need to be considered when dealing with this topic:&lt;br /&gt;
&lt;br /&gt;
* Are comments needed? If not, they should be disabled. Log in as administrator. For new posts go to '''Settings -&amp;gt; Discussion''' and uncheck &amp;quot;'''Allow people to post comments on new articles'''&amp;quot;. For existing posts, go to '''Posts''', select all of them, '''Bulk Actions -&amp;gt; Edit''' and choose “'''do not allow'''” near '''Comments''' before hitting '''Update posts'''.&lt;br /&gt;
* If comments are required, who should be able to post them? If only registered users should be allowed to add comments, go to '''Settings -&amp;gt; Discussion''' and check the “'''Users must be registered and logged in to comment'''” box.&lt;br /&gt;
* Should comments be reviewed before publishing? If so, the “'''Comment must be manually approved'''” box must be checked.&lt;br /&gt;
* If comments are not reviewed before publishing, using an anti-spam plugin like the default [https://wordpress.org/plugins/akismet/ Akismet] is advised &lt;br /&gt;
&lt;br /&gt;
As a general rule of thumb, all the options under '''Settings -&amp;gt; Discussion '''should be carefully reviewed. &lt;br /&gt;
&lt;br /&gt;
== Check file permissions ==&lt;br /&gt;
Permissions on files and directories determine who is allowed to read, write and execute them. Permission settings will vary from situation to situation and between shared hosting and dedicated hosting.&lt;br /&gt;
&lt;br /&gt;
Following is a list of desired permissions on sensitive items and fallback options:&lt;br /&gt;
&lt;br /&gt;
* wp-config.php&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 600, 640&lt;br /&gt;
* uploads folder&lt;br /&gt;
** Desired: 755&lt;br /&gt;
** Fallback: 766, 777 (not recommended)&lt;br /&gt;
* .htaccess files&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 444, 600, 640&lt;br /&gt;
&lt;br /&gt;
== Delete readme.html and install.php ==&lt;br /&gt;
The readme.html file may reveal sensitive information and is not needed from a functional perspective. The install.php is a residue of the installation process and even though it does not allow it to be restarted it’s not needed and should be removed.&lt;br /&gt;
&lt;br /&gt;
Action item:&lt;br /&gt;
&lt;br /&gt;
* Delete the /&amp;lt;WordPress_root&amp;gt;/readme.html and /&amp;lt;WordPress_root&amp;gt;/wp-admin/install.php files&lt;br /&gt;
&lt;br /&gt;
== Add blank index.php files where needed ==&lt;br /&gt;
Especially in shared environments where the settings of the web server are outside the control of the WordPress implementer, directory listing might be enabled. To add an extra layer of security, blank index.php files should be added to the folders that don’t have indexes in order to prevent browsing of the resources. The main folders that need to be considered are:&lt;br /&gt;
&lt;br /&gt;
* wp-includes&lt;br /&gt;
* wp-content&lt;br /&gt;
* wp-content/plugins&lt;br /&gt;
* wp-content/themes&lt;br /&gt;
* wp-content/uploads&lt;br /&gt;
&lt;br /&gt;
== Move wp-config.php file outside the web root folder ==&lt;br /&gt;
The wp-config.php file is a very important configuration file. It contains a lot of sensitive information about your WordPress site, like your database information for example.&lt;br /&gt;
&lt;br /&gt;
WordPress will automatically look for this file in the folder above the WordPress root folder if it does not exist in the root folder. Moving this file out of the public_html folder means the file will not be accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
== Create secret keys ==&lt;br /&gt;
Starting with the release of WordPress 2.6, a new set of security features for passwords and password hashing and cookie security is included. This feature works without doing anything, but it's not particularly powerful without some extra steps. In order to greatly increase the security of the WordPress installation, secret keys must be set up. This should be part of the standard installation process. Whenever there’s suspicion that the secret keys have been compromised, the administrator must change them. Changing the secret keys will invalidate all sessions so users will need to re-authenticate. &lt;br /&gt;
&lt;br /&gt;
Setting up or changing secret keys can be done by adding or editing the following lines to the wp-config.php file, right after the other define statements:&lt;br /&gt;
&lt;br /&gt;
''define('AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('SECURE_AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('LOGGED_IN_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('NONCE_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
== Enforce transport layer encryption for administrative tasks ==&lt;br /&gt;
It was discussed earlier that SSL should be configured and used to access the WordPress instance. Usually sites are available over port 80 and 443. This means that the users are free to choose if they use a clear text or an encrypted communication channel. &lt;br /&gt;
&lt;br /&gt;
In order to force the usage of SSL (at least) for sensitive actions, the following lines must be added to the wp-config.php file:&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_LOGIN', true);''&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_ADMIN', true);''&lt;br /&gt;
&lt;br /&gt;
== Use a Web Application Firewall (WAF) ==&lt;br /&gt;
A WAF should be in place at the web server layer. Because that is not always accessible to the implementer, a WAF plugin can be used to add this layer of protection.&lt;br /&gt;
&lt;br /&gt;
A good plugin candidate is [https://wordpress.org/plugins/ninjafirewall/ NinjaFirewall].&lt;br /&gt;
&lt;br /&gt;
== Security plugins ==&lt;br /&gt;
This section is a list of security plugins and a short description of their functionality. As previously mentioned, the focus is on free plugins.&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/better-wp-security/ iThemes Security] – iThemes Security (formerly Better WP Security) gives you over 30+ ways to secure and protect your WordPress site. In its free version it can obscure, detect, protect and recover a WordPress installation&lt;br /&gt;
* [https://wordpress.org/plugins/bulletproof-security/ BulletProof Security] – the free version offers:&lt;br /&gt;
** .htaccess Website Security Protection (Firewalls)&lt;br /&gt;
** Login Security &amp;amp; Monitoring&lt;br /&gt;
** DB Backup&lt;br /&gt;
** DB Backup Logging&lt;br /&gt;
** DB Table Prefix Changer&lt;br /&gt;
** Security Logging&lt;br /&gt;
** HTTP Error Logging&lt;br /&gt;
** FrontEnd/BackEnd Maintenance Mode&lt;br /&gt;
* [https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/ All In One WP Security &amp;amp; Firewall]&lt;br /&gt;
** User Account/Login/Registration Security&lt;br /&gt;
** Database &amp;amp; File System Security&lt;br /&gt;
** htaccess and wp-config.php File Backup and Restore&lt;br /&gt;
** Blacklist Functionality&lt;br /&gt;
** Firewall Functionality&lt;br /&gt;
** Brute-force login attack prevention&lt;br /&gt;
** Security Scanner&lt;br /&gt;
* [https://wordpress.org/plugins/sucuri-scanner/ Sucuri Security - Auditing, Malware Scanner and Security Hardening]&lt;br /&gt;
** Security Activity Auditing&lt;br /&gt;
** File Integrity Monitoring&lt;br /&gt;
** Remote Malware Scanning&lt;br /&gt;
** Blacklist Monitoring&lt;br /&gt;
** Effective Security Hardening&lt;br /&gt;
** Post-Hack Security Actions&lt;br /&gt;
** Security Notifications&lt;br /&gt;
** Website Firewall (add on)&lt;br /&gt;
* [https://wordpress.org/plugins/wp-security-scan/ Acunetix WP Security] &amp;amp; [https://wordpress.org/plugins/secure-wordpress/faq/ Acunetix Secure WordPress] – these plugins check your WordPress website/blog for security vulnerabilities and suggests corrective actions such as:&lt;br /&gt;
** Passwords&lt;br /&gt;
** File permissions&lt;br /&gt;
** Database security&lt;br /&gt;
** Version hiding&lt;br /&gt;
** WordPress admin protection/security&lt;br /&gt;
** Removes WP Generator META tag from core code&lt;br /&gt;
&lt;br /&gt;
== Disable the Plugin and Theme Editor ==&lt;br /&gt;
Occasionally you may wish to disable the plugin or theme editor to prevent overzealous users from being able to edit sensitive files and potentially crash the site. Disabling these also provides an additional layer of security if a hacker gains access to a well-privileged user account. &lt;br /&gt;
&lt;br /&gt;
Open your wp-config.php file and add the following constant:&lt;br /&gt;
&lt;br /&gt;
''define('DISALLOW_FILE_EDIT',true);''&lt;br /&gt;
&lt;br /&gt;
= Large-scale integration =&lt;br /&gt;
Implementing one WordPress site and maintaining it is a doable job for an administrator. In large corporate environments there may be hundreds of instances that need management, configuration and maintenance. This can easily become an unmanageable situation. When dealing with large number of instances, a centralized approach is needed.&lt;br /&gt;
&lt;br /&gt;
== Creating a standard image ==&lt;br /&gt;
The first step is to create a standard WordPress installation with all the security configuration and plugins in place. This should be a blank installation with no data that can be easily replicated when a new instance needs to be created. &lt;br /&gt;
&lt;br /&gt;
A process for new instances must be in place and approach at least the following subjects:&lt;br /&gt;
&lt;br /&gt;
* General configuration&lt;br /&gt;
* Database connectivity &lt;br /&gt;
* Setting the administrator account&lt;br /&gt;
&lt;br /&gt;
== LDAP integration &amp;amp; Single Sign On ==&lt;br /&gt;
User management for large WordPress sites can be a hassle. In corporate environments users are in general centrally managed and assigned to different groups. WordPress can make use of this already established situation. Whether it’s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or other LDAP compatible service, this establishment is already used in the organization trying to implement WordPress. It’s easy to set up groups based on WordPress roles and assign users to different groups, based on their required level of access. Once the integration is achieved, one can go further towards an elegant solution by implementing Single Sign On. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/active-directory-integration/ Active Directory Integration]&lt;br /&gt;
* [https://wordpress.org/support/plugin/active-directory-sso Active Directory SSO]&lt;br /&gt;
* [https://wordpress.org/plugins/simple-ldap-login/ Simple LDAP Login]&lt;br /&gt;
&lt;br /&gt;
== Multisites ==&lt;br /&gt;
A large environment requires multiple instances of WordPress. Managing each individual instance can become impossible for a single person or a small team. This is where a built-in feature of WordPress comes in handy, [http://codex.wordpress.org/Create_A_Network multisite or network of sites].&lt;br /&gt;
&lt;br /&gt;
A multisite network can be very similar to a personal version of WordPress.com. End users can create their own sites on demand, just like end users of WordPress.com can create blogs on demand. If there’s no need to allow end users to create their own sites on demand, the administrator of the network can create a multisite network in which only he can add new sites.&lt;br /&gt;
&lt;br /&gt;
A multisite network is a collection of sites that all share the same WordPress installation. They can also share plugins and themes. The individual sites in the network are virtual sites in the sense that they do not have their own directories on your server, although they do have separate directories for media uploads within the shared installation, and they do have separate tables in the database.&lt;br /&gt;
&lt;br /&gt;
WordPress does a good job in providing the necessary documentation for:&lt;br /&gt;
&lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network Installation]&lt;br /&gt;
* [http://codex.wordpress.org/Multisite_Network_Administration Administration]&lt;br /&gt;
* [http://codex.wordpress.org/Debugging_a_WordPress_Network Debugging]&lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite Migration]&lt;br /&gt;
&lt;br /&gt;
The benefit of the multisite feature is centralized management of security. Plugins can be checked once for security defects and when a stable and secure version is available it can be pushed to all the sites in the same time.&lt;br /&gt;
&lt;br /&gt;
This built-in solution might not always be the best choice. For example, all the plugins are shared between different sites and the administrators of those sites choose which plugins to enable and which to disable.&lt;br /&gt;
&lt;br /&gt;
== Unified management of multiple installations ==&lt;br /&gt;
If multiple separate instances of WordPress need to be managed centrally, there are several solutions (most of them have at least some form of commercial addons) that can accomplish the task:&lt;br /&gt;
&lt;br /&gt;
* [http://infinitewp.com/ InfinteWP] is a free, self-hosted multiple WordPress management platform that simplifies WordPress management tasks into simple clicks. Features:&lt;br /&gt;
** One master login&lt;br /&gt;
** One click updates&lt;br /&gt;
** Instant backup &amp;amp; restore&lt;br /&gt;
** Plugins &amp;amp; themes management&lt;br /&gt;
* [https://managewp.com/ ManageWP]&lt;br /&gt;
* [https://wpremote.com/ WPRemote] lets administrators monitor an unlimited number of WordPress websites. Through the WP Remote dashboard they can update WordPress and update plugins and themes. A snapshot (backup) of the websites can be downloaded from the interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
The project started with a discussion between [https://www.linkedin.com/in/dancatalinvasile Dan Vasile] (the initiator) and [https://www.linkedin.com/in/andersvinther Anders Vinther] who has already published [http://www.wpsecuritychecklist.com/ a guide] about secure WordPress implementation. Based on the information there, a part of the skeleton and content of the current project was created.&lt;br /&gt;
&lt;br /&gt;
== Browser security ==&lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm]&lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* [http://httpd.apache.org/docs/current/misc/security_tips.html http://httpd.apache.org/docs/current/misc/security_tips.html]&lt;br /&gt;
* [http://www.tecmint.com/apache-security-tips/ http://www.tecmint.com/apache-security-tips/]&lt;br /&gt;
* [https://wiki.debian.org/Apache/Hardening https://wiki.debian.org/Apache/Hardening]&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* [http://php.net/manual/en/security.php http://php.net/manual/en/security.php]&lt;br /&gt;
* [http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html]&lt;br /&gt;
* [http://www.suhosin.org/stories/index.html http://www.suhosin.org/stories/index.html]&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening]&lt;br /&gt;
* [http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips]&lt;br /&gt;
&lt;br /&gt;
== Wordpress ==&lt;br /&gt;
* [http://codex.wordpress.org/Configuring_Automatic_Background_Updates http://codex.wordpress.org/Configuring_Automatic_Background_Updates]&lt;br /&gt;
* [http://stackoverflow.com/questions/3115559/exploitable-php-functions http://stackoverflow.com/questions/3115559/exploitable-php-functions]&lt;br /&gt;
* [http://codex.wordpress.org/WordPress_Backups http://codex.wordpress.org/WordPress_Backups] &lt;br /&gt;
* [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]&lt;br /&gt;
* [http://en.support.wordpress.com/security/two-step-authentication/ http://en.support.wordpress.com/security/two-step-authentication/] &lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network http://codex.wordpress.org/Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Before_You_Create_A_Network http://codex.wordpress.org/Before_You_Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite] &lt;br /&gt;
* [http://codex.wordpress.org/Editing_wp-config.php http://codex.wordpress.org/Editing_wp-config.php]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Wordpress_Security_Checklist_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204930</id>
		<title>OWASP Wordpress Security Implementation Guideline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Security_Implementation_Guideline&amp;diff=204930"/>
				<updated>2015-12-09T03:41:04Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: add Disable the Plugin and Theme Editor section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Considerations =&lt;br /&gt;
This project aims for a unified approach on WordPress security design and implementation. It is definitely more than a checklist, it's a guide for secure implementation and an invitation to consider and to analyze each individual case. &lt;br /&gt;
&lt;br /&gt;
There is a long list of recommended resources for securing aspects of the WordPress implementation. The project is aimed to offer open source or free resources instead of commercial ones. Some plugins have a free version and a paid one that offers extra functionality. In such cases, the focus of the project was on the free version.&lt;br /&gt;
&lt;br /&gt;
= General security =&lt;br /&gt;
This section is meant to be just a reminder that all the other hardening measures are useless if an attacker can gain access to WordPress users’ computers. We’re not going to spend the time and effort to go into details but rather enumerate the common good practices each security conscious user should have in mind. There are plenty of good resources to help anyone accomplish security basics.&lt;br /&gt;
&lt;br /&gt;
== Device security ==&lt;br /&gt;
When we talk about devices capable of accessing the WordPress administration interface we don’t just talk about computers but mobile devices as well. The following is a list of items that needs to be taken into account when securing the devices that will be accessing the WordPress instances. Some of them may refer to PCs and mobile devices, others just to one of the devices.&lt;br /&gt;
&lt;br /&gt;
* Password protect the device&lt;br /&gt;
* Use strong passwords&lt;br /&gt;
* Keep the OS updated&lt;br /&gt;
* Encrypt the storage&lt;br /&gt;
* Have an anti-virus installed and updated&lt;br /&gt;
* Have a malware/spyware scanner installed and perform regular scans and updates&lt;br /&gt;
* Have a firewall installed and configured &lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm Secure your browser]&lt;br /&gt;
&lt;br /&gt;
= Infrastructure security =&lt;br /&gt;
Before hardening the core of WordPress an implementer must consider hardening the services on which the instance will be installed. Sometimes the underlying infrastructure is not under the control of the implementer. While there are things that can be hardened on WordPress to mitigate things that are supposed to be fixed on the infrastructure side, one should always consider defense in depth. The implementer can contact the infrastructure administrator and ask for specific hardening in order to further protect the applications that will be installed on top of that, in this case WordPress. &lt;br /&gt;
&lt;br /&gt;
The foundation of infrastructure hardening is operating system hardening. This is a broad subject and highly dependent on the OS, the main concerns being around privileges, access control, authentication and logging. It’s a topic outside the coverage of the current project and these are things that must be covered by experienced System Administrators.&lt;br /&gt;
&lt;br /&gt;
WordPress can be installed on a multitude of platforms but the main focus below is on the most common components, Apache and MySQL. The general rules though apply to all supported infrastructure components. &lt;br /&gt;
&lt;br /&gt;
Following best design practices, the tiers of the WordPress instance should be separated. However the presentation and application layers of WordPress are bound together. Thus only one separation is possible, the one with the database. For small applications it’s not a common practice, but for larger sites this becomes a must from a security but also a performance perspective. &lt;br /&gt;
&lt;br /&gt;
As was the case with general security, this is just a list of things that should be performed in order to harden the infrastructure and not the means to do it. &lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable directory listing&lt;br /&gt;
* Secure the communication with the server by generating and using SSL certificates&lt;br /&gt;
* Disable unnecessary modules&lt;br /&gt;
** Good candidates for this are: ''userdir'', ''suexec'', ''cgi/cgid'', ''include'', ''autoindex''&lt;br /&gt;
* Run the daemon as a separate user and group&lt;br /&gt;
* Use ''Allow'' and ''Deny'' to restrict access to directories&lt;br /&gt;
* Use ''mod_security'' module to secure Apache&lt;br /&gt;
* Disable following of ''symbolic links''&lt;br /&gt;
* Turn off server sides includes and CGI execution&lt;br /&gt;
* Limit request size&lt;br /&gt;
* Configure other settings like ''TimeOut'', ''MaxClients'', ''KeepAliveTimeout'', ''LimitRequestFields'', ''LimitRequestFieldSize'' in order to prevent DoS attacks&lt;br /&gt;
* Enable and configure proper logging&lt;br /&gt;
* Modify server banner&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Don’t install PHP as a CGI binary&lt;br /&gt;
* Disable unnecessary PHP modules&lt;br /&gt;
* Disable unused potentially dangerous PHP functions (good examples: ''exec'',''passthru'',''shell_exec'',''system'', etc.)&lt;br /&gt;
* Log errors internally&lt;br /&gt;
* Disable verbose error reporting on the client side&lt;br /&gt;
* Turn off remote code execution (if it’s not needed; the core WordPress doesn’t need this functionality)&lt;br /&gt;
* Disable magic quotes&lt;br /&gt;
* Limit PHP access to file system&lt;br /&gt;
* Protect from DoS&lt;br /&gt;
** Control POST size&lt;br /&gt;
** Limit script time execution&lt;br /&gt;
** Limit memory usage&lt;br /&gt;
* Consider implementing the [http://www.suhosin.org/stories/index.html Suhoshin security extension]&lt;br /&gt;
* Hide the version of PHP in use&lt;br /&gt;
* Hide the .php extension&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
There is an entire [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening OWASP project dedicated to MySQL hardening]. The main action items are:&lt;br /&gt;
&lt;br /&gt;
* Update regularly&lt;br /&gt;
* Disable or restrict remote access&lt;br /&gt;
* Filesystem access restrictions and ACLs&lt;br /&gt;
* Designing a chroot-jail&lt;br /&gt;
* Encrypting network traffic (this is a must if the database layer is physically separated from the application layer)&lt;br /&gt;
* Encrypting raw databases on filesystem level&lt;br /&gt;
** Redundant if disk encryption is in place at the OS layer&lt;br /&gt;
** However, by using ''dmcrypt'', one can generate an extra layer of encryption&lt;br /&gt;
* Backup encryption&lt;br /&gt;
* Configuration&lt;br /&gt;
** Connectivity: maximum number of concurrent connections and related settings&lt;br /&gt;
** Logging&lt;br /&gt;
** Access control and privilege management&lt;br /&gt;
** Set up root password&lt;br /&gt;
** Rename root account&lt;br /&gt;
** Delete unused users and databases&lt;br /&gt;
** Remove installation history&lt;br /&gt;
&lt;br /&gt;
A PHP security checker is available [https://github.com/sektioneins/pcc here]. This is a one-page php file designed to analyze PHP configuration and rank the findings based on severity.&lt;br /&gt;
&lt;br /&gt;
== Remote access ==&lt;br /&gt;
* Don’t use FTP (use sFTP where possible)&lt;br /&gt;
* If SSH access is available, use [http://linux.die.net/man/1/scp scp] or [http://winscp.net/eng/index.php WinSCP] for file transfer &lt;br /&gt;
* Consider using VPN or [http://www.pentest.ro/ssh-tunnels-an-alternative-to-vpn/ SSH tunnels] to the server for accessing the WordPress administrative interface&lt;br /&gt;
&lt;br /&gt;
= WordPress security =&lt;br /&gt;
There are three main components of WordPress that need to be considered from a security perspective when implementing the solution.&lt;br /&gt;
&lt;br /&gt;
* Core – the basic default installation files that provide most of the functionality &lt;br /&gt;
* Plugins – special written code to improve and extend the basic functionality&lt;br /&gt;
* Theme – the presentation layer which may come with some limited extended functionality&lt;br /&gt;
&lt;br /&gt;
== Updates ==&lt;br /&gt;
It is of vital importance to keep WordPress core, plugins and themes updated. Once an update is released, it needs to be applied as soon as possible to close any security holes. &lt;br /&gt;
&lt;br /&gt;
Functional problems with updates must be considered. It is possible that an update will break some of the functionality so a backup is recommended before updating the core. &lt;br /&gt;
&lt;br /&gt;
=== WordPress Core ===&lt;br /&gt;
The WordPress core has three different types of updates:&lt;br /&gt;
&lt;br /&gt;
* Core development updates, known as the &amp;quot;bleeding edge&amp;quot;&lt;br /&gt;
* Minor core updates, such as maintenance and security releases&lt;br /&gt;
* Major core release updates&lt;br /&gt;
&lt;br /&gt;
Starting with version 3.7, automatic background updates were introduced by default for minor core updates releases (generally security updates). This default behavior can be overridden by editing the wp-config.php file and adding or modifying the following statement&lt;br /&gt;
&lt;br /&gt;
''define( 'WP_AUTO_UPDATE_CORE', true );''&lt;br /&gt;
&lt;br /&gt;
When set to true all updates will be enabled. Translations are updated by default with the minor core updates.&lt;br /&gt;
&lt;br /&gt;
=== Themes and Plugins ===&lt;br /&gt;
The themes and plugins can be updated automatically using filters. The best place to put a filter is in a [http://codex.wordpress.org/Must_Use_Plugins must-use plugin]. WordPress doesn’t recommend putting filters in the wp-config.php file because of conflicts with other parts of the code.&lt;br /&gt;
&lt;br /&gt;
To enable automatic updates for themes and plugins, add the following code&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_plugin', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
''add_filter( 'auto_update_theme', '__return_true' );''&lt;br /&gt;
&lt;br /&gt;
== Removal of unused plugins and themes ==&lt;br /&gt;
Depending on the server configuration, the files in the WordPress folder can be accessed from the Internet regardless of whether they are used or not. Even if a plugin is disabled, the files are still there and they are accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
When a new vulnerability is discovered, the attackers write scripts to look for the vulnerable files. Knowing the location of vulnerable plugins increases their chances of infiltrating a vulnerable instance. &lt;br /&gt;
&lt;br /&gt;
Any plugins and themes that are not actively used must be deleted. &lt;br /&gt;
&lt;br /&gt;
== Plugins &amp;amp; Themes Security ==&lt;br /&gt;
Plugins and themes are a great addition to the functionality offered by the WordPress core. WordPress’ success is based on these elements. It’s easy to develop a new theme, add new functions with plugins. This ease of development comes with the security downside. In the rush for functionality, the developers often forget about security. Looking at the [https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=wordpress CVE list for WordPress] it’s worth noticing that in the past years most of the security defects are affecting the plugins and themes and not WordPress core.&lt;br /&gt;
&lt;br /&gt;
Developing on top of WordPress should be regarded as a regular development job and follow a standard secure development lifecycle. Concrete action items for this chapter include source code review and penetration testing of plugins and themes.&lt;br /&gt;
&lt;br /&gt;
When choosing to use an already developed plugin by a 3&amp;lt;sup&amp;gt;rd&amp;lt;/sup&amp;gt; party, a security audit should be performed. Good differentiators for available plugins are:&lt;br /&gt;
&lt;br /&gt;
* Publication in the official plugin store at [https://wordpress.org/plugins/ https://wordpress.org/plugins/]&lt;br /&gt;
* User ratings and comments&lt;br /&gt;
* Version number (is it a young plugin/theme or has it faced the challenges of time?)&lt;br /&gt;
* Last update &lt;br /&gt;
* Update frequency &lt;br /&gt;
* Compatibility with the current version of the WordPress core&lt;br /&gt;
&lt;br /&gt;
In order to perform a source code audit, the following tools can be used:&lt;br /&gt;
&lt;br /&gt;
* [http://rips-scanner.sourceforge.net/ RIPS]&lt;br /&gt;
* [http://www.program-transformation.org/PHP/PhpSat PHP-sat]&lt;br /&gt;
* [http://www.scovetta.com/yasca.html Yasca]&lt;br /&gt;
* [http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ Manual analysis using ][http://resources.infosecinstitute.com/finding-bugs-in-php-using-grep/ grep]&lt;br /&gt;
&lt;br /&gt;
Things to pay extra attention during the source code audit:&lt;br /&gt;
&lt;br /&gt;
* Obfuscated code&lt;br /&gt;
* BASE64 encode function&lt;br /&gt;
* System call functions (exec, passthru, system, shell_exec, etc.)&lt;br /&gt;
* PHP code execution (eval, assert, preg_replace, etc.)&lt;br /&gt;
* Information disclosure functions (phpinfo, getenv, getmygid/pid/uid, etc.)&lt;br /&gt;
* Filesystem functions (fopen, bz/gzopen, chgrp/own/mod, etc.)&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
The backup process is essential. The configuration of the backup process can make the distinction between a clean and fast recovery or a loss of data and prolonged downtime.&lt;br /&gt;
&lt;br /&gt;
What needs to be included in the backup?&lt;br /&gt;
&lt;br /&gt;
* The WordPress Files&lt;br /&gt;
** WordPress Core Installation&lt;br /&gt;
** WordPress Plugins&lt;br /&gt;
** WordPress Themes&lt;br /&gt;
** Images and Files&lt;br /&gt;
** JavaScript and PHP scripts, and other code files&lt;br /&gt;
** Additional Files and Static Web Pages&lt;br /&gt;
* The Database&lt;br /&gt;
&lt;br /&gt;
It’s easy to say that a full backup of the /public_html folder is needed. However there are situations in which this is not feasible nor enough. There are situations in which large quantities of data is generated in the public folder (statistics, temporary data, etc.) that is useless in the backup process. There’s also the situation in which configuration files are placed outside the public directory. They also need backup.&lt;br /&gt;
&lt;br /&gt;
The plan is to identify the files and folders that must be part of the backup process and save these in a remote location.&lt;br /&gt;
&lt;br /&gt;
For database backup, the mysql command line can be used or administrative interfaces like phpMyAdmin. &lt;br /&gt;
&lt;br /&gt;
How often should the backup be performed? It all depends on how often the instance is updated from a content perspective. If there are multiple updates a day, it’s a good idea to have a daily backup. If there’s a new article every several days, than a weekly or monthly backup is the way to go.&lt;br /&gt;
&lt;br /&gt;
It’s a good practice to keep multiple backups and have them time stamped. This is because a breach might not be noticed immediately and a clean recovery can only be performed from a backup which is several iterations old. &lt;br /&gt;
&lt;br /&gt;
Verifying that the backup is functional is part of the process. A backup that does not allow quick and full recovery is useless. The idea is to have a clean server and perform a full recovery from the backup, then check all the functionality and make sure nothing is missing.&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
The steps above are manual and labor intensive. There is a full list of plugins that can help this process: [https://wordpress.org/plugins/tags/backup https://wordpress.org/plugins/tags/backup]&lt;br /&gt;
&lt;br /&gt;
The one free alternative offering full backup capabilities that stands out of the list is [https://wordpress.org/plugins/backwpup/ BackWPup]. The free version can be used to save your complete installation including /wp-content/ and push it to an external Backup Service, like Dropbox, S3, FTP (not a good idea) and many more. &lt;br /&gt;
&lt;br /&gt;
From a security perspective, it’s worth noticing that an attacker who compromised the installation may be able to retrieve credentials and access the remote location of the backups, thus being able to manipulate or delete them. As a good precaution, on the remote side where the backups are stored, an independent process should take the backups and move them to a location inaccessible from the WordPress installation.&lt;br /&gt;
&lt;br /&gt;
== User roles and proper usage ==&lt;br /&gt;
Understanding the roles and properly assigning them to users is essential in the segregation of duties process. &lt;br /&gt;
&lt;br /&gt;
The WordPress roles are:&lt;br /&gt;
&lt;br /&gt;
* Super Admin – somebody with access to the site network administration features and all other features&lt;br /&gt;
* Administrator – somebody who has access to all the administration features within a single site&lt;br /&gt;
* Editor – somebody who can publish and manage posts including the posts of other users&lt;br /&gt;
* Author – somebody who can publish and manage their own posts&lt;br /&gt;
* Contributor – somebody who can write and manage their own posts but cannot publish them&lt;br /&gt;
* Subscriber – somebody who can only manage their profile&lt;br /&gt;
&lt;br /&gt;
The least privilege principle must be considered when assigning roles. &lt;br /&gt;
&lt;br /&gt;
A full list of privileges and a comparison between roles is available at [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/members/ Members Plugin]&lt;br /&gt;
* [https://wordpress.org/plugins/role-scoper/ Role Scoper Plugin]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-access-manager/ User Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/advanced-access-manager/ Advanced Access Manager]&lt;br /&gt;
* [http://wordpress.org/extend/plugins/user-role-editor/ User Role Editor]&lt;br /&gt;
&lt;br /&gt;
== Restrict the access to the admin interface ==&lt;br /&gt;
Restricting the access to the admin interface should be considered as no regular user is in need of access to this area. For a site with few users it makes sense to whitelist their IP addresses. Additionally, the access can be restricted only to the localhost and have the users VPN in or create a tunnel to the server (if SSH is enabled) and then access the admin interface.&lt;br /&gt;
&lt;br /&gt;
To restrict the access to the wp-admin folder, a file called .htaccess needs to be created in that folder. The content of the file should be:&lt;br /&gt;
&lt;br /&gt;
''Order Deny,Allow''&lt;br /&gt;
&lt;br /&gt;
''Deny from all''&lt;br /&gt;
&lt;br /&gt;
''Allow from 127.0.0.1''&lt;br /&gt;
&lt;br /&gt;
Multiple IP addresses separated by whitespaces can be added and the use wildcards (*) is permitted.&lt;br /&gt;
&lt;br /&gt;
== Prevent brute-forcing ==&lt;br /&gt;
Brute-forcing is the easy way in for an attacker. As discussed in the General Security chapter, a prerequisite for preventing bruteforcing is to have [https://www.owasp.org/index.php/Authentication_Cheat_Sheet#Password_Complexity strong passwords]. Apart from that, an additional layer of protection can be added in the form of [http://en.wikipedia.org/wiki/CAPTCHA CAPTCHA]. &lt;br /&gt;
&lt;br /&gt;
One good plugin candidate is [https://wordpress.org/plugins/google-captcha/ Google Captcha (reCAPTCHA)]. The advantage of this plugin is that it can be used to add the extra layer of protection on other areas as well (like registration and comments).&lt;br /&gt;
&lt;br /&gt;
CAPTCHA is not a perfect solution by any means. There are services offering real-time CAPTCHA solving for a few cents per challenge. However it takes seconds to solve a CAPTCHA even for a good service like this, thus this sort of attack becomes unfeasible.&lt;br /&gt;
&lt;br /&gt;
Another preventive measure is to lock-out accounts after a series of failed attempts. There is no plugin at the moment that can lock a user after several failed attempts for a period of time, there are plugins blocking IP addresses that are brute-forcing the login mechanism. This approach is not the best when dealing with distributed attacks.&lt;br /&gt;
&lt;br /&gt;
== Implement two factor authentication ==&lt;br /&gt;
To add another layer of security on the authentication mechanism, two factor authentication can be enabled. Two factor authentication is a method of securing accounts requiring that you not only know something (a password) to log in but also that you possess something (your mobile device). The benefit of this approach to security is that even if someone guesses your password, they need to have also stolen your possession in order to break into your account.&lt;br /&gt;
&lt;br /&gt;
Supporting plugin:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/google-authenticator/installation/ Google Authenticator]&lt;br /&gt;
&lt;br /&gt;
== Remove or change the default administrator account ==&lt;br /&gt;
There are two main reasons for creating a new administrator or modifying the old one:&lt;br /&gt;
&lt;br /&gt;
* After the installation the default username is “admin”; an attacker trying to brute-force his way in will try default usernames&lt;br /&gt;
* The default id of the admin account is 1; an attacker who discovers a SQL injection is will try to update the user with id = 1&lt;br /&gt;
&lt;br /&gt;
Both tasks can be performed manually in the database without the need to delete the admin account or can be performed in the administration User Interface. Create a new administrator, log in with the new credentials and delete the default one.&lt;br /&gt;
&lt;br /&gt;
== Disable user registration if not needed ==&lt;br /&gt;
If user management is performed manually or through integration with other user management systems, there is no need for this functionality to be enabled in WordPress.&lt;br /&gt;
&lt;br /&gt;
To disable user registration, log in as an administrator, go to '''Settings -&amp;gt; General''' and make sure the '''“Anyone can register”''' box is unchecked.&lt;br /&gt;
&lt;br /&gt;
== Change the database prefix ==&lt;br /&gt;
In case a 0-day SQL injection vulnerability is discovered, an attacker will try to exploit the known tables from a default WordPress installation. To prevent this from happening, the default prefix of the tables needs to be changed. This can be performed in several ways:&lt;br /&gt;
&lt;br /&gt;
* During the installation process&lt;br /&gt;
* Manually via ''mysql'' command line or ''phpMyAdmin'' for all the tables; after this, the wp-config.php file must be configured to reflect the changes ($table_prefix = &amp;quot;ves1uaq3_&amp;quot;;)&lt;br /&gt;
* With a plugin ([https://wordpress.org/plugins/db-prefix-change/ Change DB Prefix])&lt;br /&gt;
&lt;br /&gt;
== Control comments ==&lt;br /&gt;
WordPress was initially a blogging platform so the ability to add comments was part of the success story. Things changed with the shift of WordPress towards a CMS so comments might not be necessary in all instances. There are several things that need to be considered when dealing with this topic:&lt;br /&gt;
&lt;br /&gt;
* Are comments needed? If not, they should be disabled. Log in as administrator. For new posts go to '''Settings -&amp;gt; Discussion''' and uncheck &amp;quot;'''Allow people to post comments on new articles'''&amp;quot;. For existing posts, go to '''Posts''', select all of them, '''Bulk Actions -&amp;gt; Edit''' and choose “'''do not allow'''” near '''Comments''' before hitting '''Update posts'''.&lt;br /&gt;
* If comments are required, who should be able to post them? If only registered users should be allowed to add comments, go to '''Settings -&amp;gt; Discussion''' and check the “'''Users must be registered and logged in to comment'''” box.&lt;br /&gt;
* Should comments be reviewed before publishing? If so, the “'''Comment must be manually approved'''” box must be checked.&lt;br /&gt;
* If comments are not reviewed before publishing, using an anti-spam plugin like the default [https://wordpress.org/plugins/akismet/ Akismet] is advised &lt;br /&gt;
&lt;br /&gt;
As a general rule of thumb, all the options under '''Settings -&amp;gt; Discussion '''should be carefully reviewed. &lt;br /&gt;
&lt;br /&gt;
== Check file permissions ==&lt;br /&gt;
Permissions on files and directories determine who is allowed to read, write and execute them. Permission settings will vary from situation to situation and between shared hosting and dedicated hosting.&lt;br /&gt;
&lt;br /&gt;
Following is a list of desired permissions on sensitive items and fallback options:&lt;br /&gt;
&lt;br /&gt;
* wp-config.php&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 600, 640&lt;br /&gt;
* uploads folder&lt;br /&gt;
** Desired: 755&lt;br /&gt;
** Fallback: 766, 777 (not recommended)&lt;br /&gt;
* .htaccess files&lt;br /&gt;
** Desired: 400&lt;br /&gt;
** Fallback: 440, 444, 600, 640&lt;br /&gt;
&lt;br /&gt;
== Delete readme.html and install.php ==&lt;br /&gt;
The readme.html file may reveal sensitive information and is not needed from a functional perspective. The install.php is a residue of the installation process and even though it does not allow it to be restarted it’s not needed and should be removed.&lt;br /&gt;
&lt;br /&gt;
Action item:&lt;br /&gt;
&lt;br /&gt;
* Delete the /&amp;lt;WordPress_root&amp;gt;/readme.html and /&amp;lt;WordPress_root&amp;gt;/wp-admin/install.php files&lt;br /&gt;
&lt;br /&gt;
== Add blank index.php files where needed ==&lt;br /&gt;
Especially in shared environments where the settings of the web server are outside the control of the WordPress implementer, directory listing might be enabled. To add an extra layer of security, blank index.php files should be added to the folders that don’t have indexes in order to prevent browsing of the resources. The main folders that need to be considered are:&lt;br /&gt;
&lt;br /&gt;
* wp-includes&lt;br /&gt;
* wp-content&lt;br /&gt;
* wp-content/plugins&lt;br /&gt;
* wp-content/themes&lt;br /&gt;
* wp-content/uploads&lt;br /&gt;
&lt;br /&gt;
== Move wp-config.php file outside the web root folder ==&lt;br /&gt;
The wp-config.php file is a very important configuration file. It contains a lot of sensitive information about your WordPress site, like your database information for example.&lt;br /&gt;
&lt;br /&gt;
WordPress will automatically look for this file in the folder above the WordPress root folder if it does not exist in the root folder. Moving this file out of the public_html folder means the file will not be accessible from the Internet.&lt;br /&gt;
&lt;br /&gt;
== Create secret keys ==&lt;br /&gt;
Starting with the release of WordPress 2.6, a new set of security features for passwords and password hashing and cookie security is included. This feature works without doing anything, but it's not particularly powerful without some extra steps. In order to greatly increase the security of the WordPress installation, secret keys must be set up. This should be part of the standard installation process. Whenever there’s suspicion that the secret keys have been compromised, the administrator must change them. Changing the secret keys will invalidate all sessions so users will need to re-authenticate. &lt;br /&gt;
&lt;br /&gt;
Setting up or changing secret keys can be done by adding or editing the following lines to the wp-config.php file, right after the other define statements:&lt;br /&gt;
&lt;br /&gt;
''define('AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('SECURE_AUTH_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('LOGGED_IN_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
''define('NONCE_KEY', 'put your unique phrase here');''&lt;br /&gt;
&lt;br /&gt;
== Enforce transport layer encryption for administrative tasks ==&lt;br /&gt;
It was discussed earlier that SSL should be configured and used to access the WordPress instance. Usually sites are available over port 80 and 443. This means that the users are free to choose if they use a clear text or an encrypted communication channel. &lt;br /&gt;
&lt;br /&gt;
In order to force the usage of SSL (at least) for sensitive actions, the following lines must be added to the wp-config.php file:&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_LOGIN', true);''&lt;br /&gt;
&lt;br /&gt;
''define('FORCE_SSL_ADMIN', true);''&lt;br /&gt;
&lt;br /&gt;
== Use a Web Application Firewall (WAF) ==&lt;br /&gt;
A WAF should be in place at the web server layer. Because that is not always accessible to the implementer, a WAF plugin can be used to add this layer of protection.&lt;br /&gt;
&lt;br /&gt;
A good plugin candidate is [https://wordpress.org/plugins/ninjafirewall/ NinjaFirewall].&lt;br /&gt;
&lt;br /&gt;
== Security plugins ==&lt;br /&gt;
This section is a list of security plugins and a short description of their functionality. As previously mentioned, the focus is on free plugins.&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/better-wp-security/ iThemes Security] – iThemes Security (formerly Better WP Security) gives you over 30+ ways to secure and protect your WordPress site. In its free version it can obscure, detect, protect and recover a WordPress installation&lt;br /&gt;
* [https://wordpress.org/plugins/bulletproof-security/ BulletProof Security] – the free version offers:&lt;br /&gt;
** .htaccess Website Security Protection (Firewalls)&lt;br /&gt;
** Login Security &amp;amp; Monitoring&lt;br /&gt;
** DB Backup&lt;br /&gt;
** DB Backup Logging&lt;br /&gt;
** DB Table Prefix Changer&lt;br /&gt;
** Security Logging&lt;br /&gt;
** HTTP Error Logging&lt;br /&gt;
** FrontEnd/BackEnd Maintenance Mode&lt;br /&gt;
* [https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/ All In One WP Security &amp;amp; Firewall]&lt;br /&gt;
** User Account/Login/Registration Security&lt;br /&gt;
** Database &amp;amp; File System Security&lt;br /&gt;
** htaccess and wp-config.php File Backup and Restore&lt;br /&gt;
** Blacklist Functionality&lt;br /&gt;
** Firewall Functionality&lt;br /&gt;
** Brute-force login attack prevention&lt;br /&gt;
** Security Scanner&lt;br /&gt;
* [https://wordpress.org/plugins/sucuri-scanner/ Sucuri Security - Auditing, Malware Scanner and Security Hardening]&lt;br /&gt;
** Security Activity Auditing&lt;br /&gt;
** File Integrity Monitoring&lt;br /&gt;
** Remote Malware Scanning&lt;br /&gt;
** Blacklist Monitoring&lt;br /&gt;
** Effective Security Hardening&lt;br /&gt;
** Post-Hack Security Actions&lt;br /&gt;
** Security Notifications&lt;br /&gt;
** Website Firewall (add on)&lt;br /&gt;
* [https://wordpress.org/plugins/wp-security-scan/ Acunetix WP Security] &amp;amp; [https://wordpress.org/plugins/secure-wordpress/faq/ Acunetix Secure WordPress] – these plugins check your WordPress website/blog for security vulnerabilities and suggests corrective actions such as:&lt;br /&gt;
** Passwords&lt;br /&gt;
** File permissions&lt;br /&gt;
** Database security&lt;br /&gt;
** Version hiding&lt;br /&gt;
** WordPress admin protection/security&lt;br /&gt;
** Removes WP Generator META tag from core code&lt;br /&gt;
&lt;br /&gt;
== Disable the Plugin and Theme Editor ==&lt;br /&gt;
Occasionally you may wish to disable the plugin or theme editor to prevent overzealous users from being able to edit sensitive files and potentially crash the site. Disabling these also provides an additional layer of security if a hacker gains access to a well-privileged user account. &lt;br /&gt;
&lt;br /&gt;
Open your wp-config.php file and add the following constant:&lt;br /&gt;
&lt;br /&gt;
''define('DISALLOW_FILE_EDIT',true);''&lt;br /&gt;
&lt;br /&gt;
= Large-scale integration =&lt;br /&gt;
Implementing one WordPress site and maintaining it is a doable job for an administrator. In large corporate environments there may be hundreds of instances that need management, configuration and maintenance. This can easily become an unmanageable situation. When dealing with large number of instances, a centralized approach is needed.&lt;br /&gt;
&lt;br /&gt;
== Creating a standard image ==&lt;br /&gt;
The first step is to create a standard WordPress installation with all the security configuration and plugins in place. This should be a blank installation with no data that can be easily replicated when a new instance needs to be created. &lt;br /&gt;
&lt;br /&gt;
A process for new instances must be in place and approach at least the following subjects:&lt;br /&gt;
&lt;br /&gt;
* General configuration&lt;br /&gt;
* Database connectivity &lt;br /&gt;
* Setting the administrator account&lt;br /&gt;
&lt;br /&gt;
== LDAP integration &amp;amp; Single Sign On ==&lt;br /&gt;
User management for large WordPress sites can be a hassle. In corporate environments users are in general centrally managed and assigned to different groups. WordPress can make use of this already established situation. Whether it’s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or other LDAP compatible service, this establishment is already used in the organization trying to implement WordPress. It’s easy to set up groups based on WordPress roles and assign users to different groups, based on their required level of access. Once the integration is achieved, one can go further towards an elegant solution by implementing Single Sign On. &lt;br /&gt;
&lt;br /&gt;
Supporting plugins:&lt;br /&gt;
&lt;br /&gt;
* [https://wordpress.org/plugins/active-directory-integration/ Active Directory Integration]&lt;br /&gt;
* [https://wordpress.org/support/plugin/active-directory-sso Active Directory SSO]&lt;br /&gt;
* [https://wordpress.org/plugins/simple-ldap-login/ Simple LDAP Login]&lt;br /&gt;
&lt;br /&gt;
== Multisites ==&lt;br /&gt;
A large environment requires multiple instances of WordPress. Managing each individual instance can become impossible for a single person or a small team. This is where a built-in feature of WordPress comes in handy, [http://codex.wordpress.org/Create_A_Network multisite or network of sites].&lt;br /&gt;
&lt;br /&gt;
A multisite network can be very similar to a personal version of WordPress.com. End users can create their own sites on demand, just like end users of WordPress.com can create blogs on demand. If there’s no need to allow end users to create their own sites on demand, the administrator of the network can create a multisite network in which only he can add new sites.&lt;br /&gt;
&lt;br /&gt;
A multisite network is a collection of sites that all share the same WordPress installation. They can also share plugins and themes. The individual sites in the network are virtual sites in the sense that they do not have their own directories on your server, although they do have separate directories for media uploads within the shared installation, and they do have separate tables in the database.&lt;br /&gt;
&lt;br /&gt;
WordPress does a good job in providing the necessary documentation for:&lt;br /&gt;
&lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network Installation]&lt;br /&gt;
* [http://codex.wordpress.org/Multisite_Network_Administration Administration]&lt;br /&gt;
* [http://codex.wordpress.org/Debugging_a_WordPress_Network Debugging]&lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite Migration]&lt;br /&gt;
&lt;br /&gt;
The benefit of the multisite feature is centralized management of security. Plugins can be checked once for security defects and when a stable and secure version is available it can be pushed to all the sites in the same time.&lt;br /&gt;
&lt;br /&gt;
This built-in solution might not always be the best choice. For example, all the plugins are shared between different sites and the administrators of those sites choose which plugins to enable and which to disable.&lt;br /&gt;
&lt;br /&gt;
== Unified management of multiple installations ==&lt;br /&gt;
If multiple separate instances of WordPress need to be managed centrally, there are several solutions (most of them have at least some form of commercial addons) that can accomplish the task:&lt;br /&gt;
&lt;br /&gt;
* [http://infinitewp.com/ InfinteWP] is a free, self-hosted multiple WordPress management platform that simplifies WordPress management tasks into simple clicks. Features:&lt;br /&gt;
** One master login&lt;br /&gt;
** One click updates&lt;br /&gt;
** Instant backup &amp;amp; restore&lt;br /&gt;
** Plugins &amp;amp; themes management&lt;br /&gt;
* [https://managewp.com/ ManageWP]&lt;br /&gt;
* [https://wpremote.com/ WPRemote] lets administrators monitor an unlimited number of WordPress websites. Through the WP Remote dashboard they can update WordPress and update plugins and themes. A snapshot (backup) of the websites can be downloaded from the interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
The project started with a discussion between [https://www.linkedin.com/in/dancatalinvasile Dan Vasile] (the initiator) and [https://www.linkedin.com/in/andersvinther Anders Vinther] who has already published [http://www.wpsecuritychecklist.com/ a guide] about secure WordPress implementation. Based on the information there, a part of the skeleton and content of the current project was created.&lt;br /&gt;
&lt;br /&gt;
== Browser security ==&lt;br /&gt;
* [http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm http://www.cert.org/historical/tech_tips/securing-web-browser-index.cfm]&lt;br /&gt;
&lt;br /&gt;
== Apache hardening ==&lt;br /&gt;
* [http://httpd.apache.org/docs/current/misc/security_tips.html http://httpd.apache.org/docs/current/misc/security_tips.html]&lt;br /&gt;
* [http://www.tecmint.com/apache-security-tips/ http://www.tecmint.com/apache-security-tips/]&lt;br /&gt;
* [https://wiki.debian.org/Apache/Hardening https://wiki.debian.org/Apache/Hardening]&lt;br /&gt;
&lt;br /&gt;
== PHP hardening ==&lt;br /&gt;
* [http://php.net/manual/en/security.php http://php.net/manual/en/security.php]&lt;br /&gt;
* [http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html]&lt;br /&gt;
* [http://www.suhosin.org/stories/index.html http://www.suhosin.org/stories/index.html]&lt;br /&gt;
&lt;br /&gt;
== MySQL hardening ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening https://www.owasp.org/index.php/OWASP_Backend_Security_Project_MySQL_Hardening]&lt;br /&gt;
* [http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips]&lt;br /&gt;
&lt;br /&gt;
== Wordpress ==&lt;br /&gt;
* [http://codex.wordpress.org/Configuring_Automatic_Background_Updates http://codex.wordpress.org/Configuring_Automatic_Background_Updates]&lt;br /&gt;
* [http://stackoverflow.com/questions/3115559/exploitable-php-functions http://stackoverflow.com/questions/3115559/exploitable-php-functions]&lt;br /&gt;
* [http://codex.wordpress.org/WordPress_Backups http://codex.wordpress.org/WordPress_Backups] &lt;br /&gt;
* [http://codex.wordpress.org/Roles_and_Capabilities http://codex.wordpress.org/Roles_and_Capabilities]&lt;br /&gt;
* [http://en.support.wordpress.com/security/two-step-authentication/ http://en.support.wordpress.com/security/two-step-authentication/] &lt;br /&gt;
* [http://codex.wordpress.org/Create_A_Network http://codex.wordpress.org/Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Before_You_Create_A_Network http://codex.wordpress.org/Before_You_Create_A_Network] &lt;br /&gt;
* [http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite http://codex.wordpress.org/Migrating_Multiple_Blogs_into_WordPress_3.0_Multisite] &lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Wordpress_Security_Checklist_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195898</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195898"/>
				<updated>2015-06-08T14:48:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Current Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
* Password auditing&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Stable Release]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*And run &amp;lt;tt&amp;gt;php app.php -h&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/d0lph1n98 Fakhri Zulkifli]&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195897</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195897"/>
				<updated>2015-06-08T13:56:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Requirement / Installation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Stable Release]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*And run &amp;lt;tt&amp;gt;php app.php -h&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/d0lph1n98 Fakhri Zulkifli]&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195896</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195896"/>
				<updated>2015-06-08T13:56:12Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Requirement / Installation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Stable Release]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/d0lph1n98 Fakhri Zulkifli]&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195895</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195895"/>
				<updated>2015-06-08T13:55:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Stable Release]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/d0lph1n98 Fakhri Zulkifli]&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195815</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195815"/>
				<updated>2015-06-05T07:31:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/d0lph1n98 Fakhri Zulkifli]&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195793</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195793"/>
				<updated>2015-06-04T20:10:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Vulnerability Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
The basic security check will review a WordPress installation for common security related mis-configurations. Testing with the basic check option uses regular web requests. The system downloads a handful of pages from the target site, then performs analysis on the resulting html source.&lt;br /&gt;
&lt;br /&gt;
The more aggressive enumeration option attempts to find all plugins / themes that are being used on the WordPress installation and can attempt to enumerate users of the site. These tests will generate HTTP 404 errors in the web server logs of the target site. If you test all plugins, be warned that this will generate more than 18000 log entries and potentially triggered intrusion prevention measures.&lt;br /&gt;
&lt;br /&gt;
Aggressively discover the WordPress plugins and themes installed on a site. Utilizes a database of over 18000 plugins and 2600 themes during testing. Fingerprint the version of the discovered plugins and themes. This version can be compared against latest releases and known security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195772</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195772"/>
				<updated>2015-06-04T09:56:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Vulnerability Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195767</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195767"/>
				<updated>2015-06-04T07:46:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Road Map */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Change to script argument instead of user input for scan options.&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195763</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195763"/>
				<updated>2015-06-04T07:20:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195762</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195762"/>
				<updated>2015-06-04T07:18:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195761</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195761"/>
				<updated>2015-06-04T07:03:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide all the information regarding the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195760</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195760"/>
				<updated>2015-06-04T07:00:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide the all the information about the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application. &lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195759</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195759"/>
				<updated>2015-06-04T06:54:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Current Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide the all the information about the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file, etc..)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration, etc..)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195758</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195758"/>
				<updated>2015-06-04T06:53:04Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide the all the information about the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
===Road Map===&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195757</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195757"/>
				<updated>2015-06-04T06:52:12Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
A Wordpress Scanner written in PHP, focus on vulnerability assessment and security audit of misconfiguration in the Wordpress installation. Wordpress Scanner is capable of finding the flaw in the Wordpress installation and will provide the all the information about the vulnerability. Wordpress Scanner is not a tool for code auditing, it performs &amp;quot;black box&amp;quot; scanning for the Wordpress powered web application.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195756</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195756"/>
				<updated>2015-06-04T06:51:13Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Current Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Detect version of wordpress installation&lt;br /&gt;
* Detect sensitive file. (eg: readme, database replacing file)&lt;br /&gt;
* Detect enabled feature on installation. (eg: multisite enabled, allow registration)&lt;br /&gt;
* Detect theme name (through passive fingerprinting)&lt;br /&gt;
* List of installed plugins (through passive fingerprinting)&lt;br /&gt;
* Enumerate Plugins&lt;br /&gt;
* Enumerate Themes&lt;br /&gt;
* Enumerate Users&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195755</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195755"/>
				<updated>2015-06-04T06:46:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195754</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195754"/>
				<updated>2015-06-04T06:45:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/RamadhanAmizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195753</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195753"/>
				<updated>2015-06-04T06:45:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195752</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195752"/>
				<updated>2015-06-04T06:45:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
*[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
*[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
*Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195751</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195751"/>
				<updated>2015-06-04T06:43:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Contact Us */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* #owaspmy @ FreeNode&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195750</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195750"/>
				<updated>2015-06-04T06:43:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Contact Us */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
* IRC @ FreeNode #owaspmy&lt;br /&gt;
* [https://www.facebook.com/OWASP.Malaysia OWASP Malaysia]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195749</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195749"/>
				<updated>2015-06-04T06:41:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
IRC:FreeNode #owaspmy&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195748</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195748"/>
				<updated>2015-06-04T06:41:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
IRC:FreeNode #owaspmy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195747</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195747"/>
				<updated>2015-06-04T06:36:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not do static analysis of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195746</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195746"/>
				<updated>2015-06-04T06:33:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nawawi Nawawi Jamili] - Code Enhancement.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195745</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195745"/>
				<updated>2015-06-04T06:26:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Current Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
The following features are currently available. &lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195744</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195744"/>
				<updated>2015-06-04T06:24:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Current Features==&lt;br /&gt;
* Feature 1&lt;br /&gt;
* Feature 2&lt;br /&gt;
* Feature 3&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195743</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195743"/>
				<updated>2015-06-04T06:22:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195712</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195712"/>
				<updated>2015-06-03T12:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Wordpress Scanner is BlackBox Wordpress Vulnerability Scanner, inspired by [http://wpscan.org WPScan] and written in PHP.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195711</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195711"/>
				<updated>2015-06-03T11:57:52Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Requirement / Installation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
'''Requirement'''&lt;br /&gt;
* PHP &amp;gt;= 5.3&lt;br /&gt;
* PHP cURL Extension&lt;br /&gt;
* PHP JSON Extension&lt;br /&gt;
* PHP OpenSSL Extension (HTTPS Support)&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
&lt;br /&gt;
*Download from repo: &amp;lt;tt&amp;gt;git clone https://github.com/RamadhanAmizudin/Wordpress-scanner.git&amp;lt;/tt&amp;gt;&lt;br /&gt;
*Start Scanning: &amp;lt;tt&amp;gt;php app.php &amp;amp;lt;url&amp;amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195709</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195709"/>
				<updated>2015-06-03T11:53:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195697</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195697"/>
				<updated>2015-06-03T02:05:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195696</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195696"/>
				<updated>2015-06-03T02:04:49Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Add Password audit support&lt;br /&gt;
*Add custom wordpress directory(wp-content and wp-plugin)&lt;br /&gt;
*Add support for static user agent(currently random)&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195695</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195695"/>
				<updated>2015-06-03T01:58:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing plugin/theme/version vulnerability database - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195694</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195694"/>
				<updated>2015-06-03T01:55:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195693</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195693"/>
				<updated>2015-06-03T01:52:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195692</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195692"/>
				<updated>2015-06-03T01:47:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== GitHub ==&lt;br /&gt;
*Latest Release @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/releases Wordpress-Scanner Stable]&lt;br /&gt;
*Source Code @ [https://github.com/RamadhanAmizudin/Wordpress-scanner/ Wordpress-Scanner on Github]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195691</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195691"/>
				<updated>2015-06-03T01:29:49Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195690</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195690"/>
				<updated>2015-06-03T01:18:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Wordpress Scanner is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195689</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195689"/>
				<updated>2015-06-03T01:16:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
Wordpress Scanner allows you to audit the security of your wordpress installation. It performs &amp;quot;black-box&amp;quot; scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for known vulnerability&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License]. &lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195687</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195687"/>
				<updated>2015-06-03T01:11:14Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit of wordpress installation.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License]. &lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195677</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195677"/>
				<updated>2015-06-02T20:33:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in PHP, focus on vulnerability assessment and security audit.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License]. &lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195676</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195676"/>
				<updated>2015-06-02T20:32:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: /* OWASP Wordpress Scanner Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A wordpress scanner written in php. OWASP Wordpress Scanner is a wordpress vulnerability scanner.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License]. &lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195675</id>
		<title>OWASP Wordpress Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Wordpress_Vulnerability_Scanner_Project&amp;diff=195675"/>
				<updated>2015-06-02T20:29:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ramadhan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Wordpress Scanner Project==&lt;br /&gt;
&lt;br /&gt;
A Wordpress scanner written in php. main focus of the tools is to analyze a wordpress installation againts a known vulnerability.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://opensource.org/licenses/MIT MIT License]. &lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[https://github.com/ramadhanamizudin Ramadhan Amizudin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/RamadhanAmizudin/ Ramadhan Amizudin] - Core Developer&lt;br /&gt;
&lt;br /&gt;
[https://github.com/mokhdzanifaeq/ Mokhdzani Faeq] - Multi-thread support for plugin enumeration.&lt;br /&gt;
&lt;br /&gt;
Big thanks to WPScan.org team for providing vulnerable plugins list and md5 file hash for version checking. - WPScan.org&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of now, the priorities are:&lt;br /&gt;
*Rewrite code to be more modular&lt;br /&gt;
*Unit Tests&lt;br /&gt;
*Add Proxy Support&lt;br /&gt;
*Add Web UI&lt;br /&gt;
*Vulnerability Database (currently using https://wpvulndb.com)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ramadhan</name></author>	</entry>

	</feed>