URL: https://robertmarcs.com.au/ [103.50.34.27] Started: Sun Jun 15 19:48:05 2025 Interesting Finding(s): Headers | Interesting Entry: Server: nginx | Found By: Headers (Passive Detection) | Confidence: 100% robots.txt found: https://robertmarcs.com.au/robots.txt | Found By: Robots Txt (Aggressive Detection) | Confidence: 100% XML-RPC seems to be enabled: https://robertmarcs.com.au/xmlrpc.php | Found By: Link Tag (Passive Detection) | Confidence: 100% | Confirmed By: Direct Access (Aggressive Detection), 100% confidence | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/ | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/ WordPress readme found: https://robertmarcs.com.au/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% This site has 'Must Use Plugins': https://robertmarcs.com.au/wp-content/mu-plugins/ | Found By: Direct Access (Aggressive Detection) | Confidence: 80% | Reference: http://codex.wordpress.org/Must_Use_Plugins Upload directory has listing enabled: https://robertmarcs.com.au/wp-content/uploads/ | Found By: Direct Access (Aggressive Detection) | Confidence: 100% The external WP-Cron seems to be enabled: https://robertmarcs.com.au/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 6.7.2 identified (Outdated, released on 2025-02-11). | Found By: Rss Generator (Passive Detection) | - https://robertmarcs.com.au/comments/feed/, https://wordpress.org/?v=6.7.2 | Confirmed By: Meta Generator (Passive Detection) | - https://robertmarcs.com.au/, Match: 'WordPress 6.7.2' WordPress theme in use: hello-elementor | Location: https://robertmarcs.com.au/wp-content/themes/hello-elementor/ | Last Updated: 2025-06-08T00:00:00.000Z | Readme: https://robertmarcs.com.au/wp-content/themes/hello-elementor/readme.txt | The version is out of date, the latest version is 3.4.4 | Style URL: https://robertmarcs.com.au/wp-content/themes/hello-elementor/style.css?ver=3.1.1 | Style Name: Hello Elementor | Style URI: https://elementor.com/hello-theme/?utm_source=wp-themes&utm_campaign=theme-uri&utm_medium=wp-dash | Description: Hello Elementor is a lightweight and minimalist WordPress theme that was built specifically to work ... | Author: Elementor Team | Author URI: https://elementor.com/?utm_source=wp-themes&utm_campaign=author-uri&utm_medium=wp-dash | | Found By: Css Style In Homepage (Passive Detection) | Confirmed By: Css Style In 404 Page (Passive Detection) | | Version: 3.1.1 (80% confidence) | Found By: Style (Passive Detection) | - https://robertmarcs.com.au/wp-content/themes/hello-elementor/style.css?ver=3.1.1, Match: 'Version: 3.1.1' Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| User(s) Identified: admin | Found By: Rss Generator (Passive Detection) | Confirmed By: Rss Generator (Aggressive Detection) admin_hi7ih2x4 | Found By: Wp Json Api (Aggressive Detection) | - https://robertmarcs.com.au/wp-json/wp/v2/users/?per_page=100&page=1 | Confirmed By: | Oembed API - Author URL (Aggressive Detection) | - https://robertmarcs.com.au/wp-json/oembed/1.0/embed?url=https://robertmarcs.com.au/&format=json | Yoast Seo Author Sitemap (Aggressive Detection) | - https://robertmarcs.com.au/author-sitemap.xml | Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Login Error Messages (Aggressive Detection) wordpresslicensed | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Confirmed By: Login Error Messages (Aggressive Detection) wp-backup | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Confirmed By: Login Error Messages (Aggressive Detection) No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Sun Jun 15 19:48:44 2025 Requests Done: 55 Cached Requests: 8 Data Sent: 15.448 KB Data Received: 1.138 MB Memory used: 192.527 MB Elapsed time: 00:00:38