URL: https://itsm.az/ [78.47.254.29] Started: Sat Mar 29 00:22:41 2025 Interesting Finding(s): Headers | Interesting Entries: | - Server: Apache | - Upgrade: h2 | - Content-Security-Policy: object-src 'none' | - Permissions-Policy: accelerometer=(), camera=(), geolocation=(), gyroscope=(), magnetometer=(), microphone=(), payment=(), usb=(), interest-cohort=() | - Referrer-Policy: no-referrer-when-downgrade | Found By: Headers (Passive Detection) | Confidence: 100% WordPress readme found: https://itsm.az/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% The external WP-Cron seems to be enabled: https://itsm.az/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 6.7.2 identified (Latest, released on 2025-02-11). | Found By: Query Parameter In Install Page (Aggressive Detection) | - https://itsm.az/wp-includes/css/dashicons.min.css?ver=6.7.2 | - https://itsm.az/wp-includes/css/buttons.min.css?ver=6.7.2 | - https://itsm.az/wp-admin/css/forms.min.css?ver=6.7.2 | - https://itsm.az/wp-admin/css/l10n.min.css?ver=6.7.2 | - https://itsm.az/wp-admin/css/install.min.css?ver=6.7.2 The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Sat Mar 29 00:23:38 2025 Requests Done: 59 Cached Requests: 5 Data Sent: 17.566 KB Data Received: 1.667 MB Memory used: 169.828 MB Elapsed time: 00:00:57 Scan Aborted: Max Scan Duration Reached