plecost v0.2.2-8 Beta released
Wordpress finger printer tool search and retrieve information about the plugins versions installed in Wordpress systems.
It can analyze a single URL or perform an analysis based on the results indexed by Google. Additionally displays CVE code associated with each plugin, if there.
Libraries
Plecost works in two modes. On the one hand by analyzing a single URL and the other analyzing the results of Google searches (-G).
Google search options:
-l num : Limit number of results for each plugin in google.
-G : Google search mode
Options:
-n : Number of plugins to use (Default all - more than 7000).
-c : Check plugins only with CVE associated.
-R file : Reload plugin list. Use -n option to control the size (This take several minutes)
-o file : Output file. (Default "output.txt")
-i file : Input plugin list. (Need to start the program)
-s time : Min sleep time between two probes. Time in seconds. (Default 10)
-M time : Max sleep time between two probes. Time in seconds. (Default 20)
-t num : Number of threads. (Default 1)
-h : Display help. (More info: http://iniqua.com/labs/)
More information: here
Post scriptum
Related Articles
Enumeration |
|
Information Gathering |
|
plecost |
|