“The problem of viruses is temporary and will be solved in two years.” – John McAfee, 1988Continue…
Recently I needed to migrate the contents of a WordPress 2.1.7 (really old!) on a new installation based on WordPress 4.9.1.
So i’ve exported all contents from old site using the standard export procedure, but during the import on the new platform, the process fails with this error:
Error: This does not appear to be a WXR file, missing/invalid WXR version number
The problem seems related to the lack of a version tag in the WRX file exported from the old wordpress, and starting from this information, I’ve found an easy fix that solve the problem (at least for me):
- Open the exported XML file.
- Before the
- Retry the import of the file.
WPSeku is a Black-box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.
What is a Black-box scanner?
Black-box security testing refers to a method of software security testing in which the security controls, defences and design of an application are tested from the outside-in, with little or no prior knowledge of the application’s internal workings.
Essentially, black-box testing takes an approach similar to that of a real attacker.
The last available version is the 0.2.1 and can be downloaded from GitHub.
First, install requests:
# pip install requests
After, clone the git repository:
# git clone https://github.com/m4ll0k/WPSeku.git
Finally, start the tool:
# python wpseku.py
Usage: ./wpseku.py [--target|-t] http://localhost
-t --target Target URL (eg: http://localhost)
-x --xss Testing XSS vulns
-s --sql Testing SQL vulns
-l --lfi Testing LFI vulns
-q --query Testable parameters (eg: "id=1&test=1")
-b --brute Bruteforce login via xmlrpc
-u --user Set username, default=admin
-p --proxy Set proxy, (host:port)
-m --method Set method (GET/POST)
-c --cookie Set cookies
-w --wordlist Set wordlist
-a --agent Set user-agent
-r --redirect Redirect target url, default=True
-h --help Show this help and exit
wpseku.py --target http://localhost
wpseku.py -t http://localhost/wp-admin/post.php -m GET -q "post=49&action=edit" [-x,-s,-l]
wpseku.py --target http://localhost --brute --wordlist dict.txt
wpseku.py --target http://localhost --brute --user test --wordlist dict.txt