Then it is a pity this website failed a low impact test: -https://code313detroit.org/
WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
Plugin Update Status About
js_composer Unknown
nd-shortcodes Unknown latest release (6.3)
https://nicdark.comnd-projects Unknown latest release (1.3)
https://nicdark.comcontact-form-7 Unknown latest release (5.3.2)
https://contactform7.com/revslider Unknown
woocommerce 3.0.7 Warning latest release (4.8.0)
https://woocommerce.com/slider-revolution 6.2.2 Unknown
nd-donations Unknown latest release (1.7)
https://nicdark.comPlugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.
There are likely more plugins installed than those listed here as the detection method used here is passive. While these results give an indication of the status of plugin updates, a more comprehensive assessment should be undertaken by brute forcing the plugin paths using a dedicated tool.
User Enumeration
The first two user ID's were tested to determine if user enumeration is possible.
Username Name
ID: 1 code313 code313
ID: 2 garybeaver Gary Beaver
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. Take note that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
However been given the all clean bill by DShield CLEAN
AlienVault OTX CLEAN
Cisco Talos CLEAN
abuse.ch (Feodo) CLEAN
URLhaus CLEAN
Spamhaus (Drop / eDrop) CLEAN
Bad for our future coders, big names for charity should do a better job in leadership. Hey Google, Amazon, Verizon, Microsoft?
A very happy and healthy New Year 2021 to you all, whishes,
Damian aka polonus