Membership level: Free member
Enumerate Wordpress Users (wpscan --url https://aptabase.bitegg.co/ --enumerate u --random-user-agent --force --max-scan-duration 60)
URL: https://aptabase.bitegg.co/ [2606:4700:3034::ac43:dd11]
Started: Mon Jan 13 11:59:20 2025

Interesting Finding(s):

Headers
 | Interesting Entries:
 |  - content-security-policy: default-src 'self' 'unsafe-inline'; img-src 'self' data: https:; style-src 'self' 'unsafe-inline' https://client.crisp.chat; script-src 'self' 'unsafe-inline' https://client.crisp.chat; font-src 'self' https://client.crisp.chat; connect-src 'self' https://raw.githubusercontent.com wss://client.relay.crisp.chat https://client.crisp.chat;
 |  - cf-cache-status: DYNAMIC
 |  - Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XIUJCJryN8q99%2FO9g6I63fvfYvvX2eGq9I%2Frl3UprJ7DS78OsrcqvaARPb7rSZw9zranUwie%2F%2Fmoqu%2FXYHMbC3KBAOrad6g1HJp64RexhHQjyCPrvZQudQvS9DIEC3h6%2BCqyHH%2BDLUcNXJ9UhqILUvg%3D"}],"group":"cf-nel","max_age":604800}
 |  - NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
 |  - Server: cloudflare
 |  - CF-RAY: 9017f73fce29f0e1-LAX
 |  - alt-svc: h3=":443"; ma=86400
 |  - server-timing: cfL4;desc="?proto=TCP&rtt=980&min_rtt=975&rtt_var=377&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2836&recv_bytes=846&delivery_rate=3964705&cwnd=252&unsent_bytes=0&cid=0dd1e93fd93b33c5&ts=627&x=0"
 | Found By: Headers (Passive Detection)
 | Confidence: 100%


Fingerprinting the version -: |========================== No WPScan API Token given, as a result vulnerability data has not been output.
 You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

Finished: Mon Jan 13 12:00:16 2025
Requests Done: 435
Cached Requests: 4
Data Sent: 111.315 KB
Data Received: 415.173 KB
Memory used: 104.168 MB
Elapsed time: 00:00:55

Scan Aborted: Max Scan Duration Reached
Color Scheme
Target
aptabase.bitegg.co
Scan method
Enumerate Wordpress Users
Run command
wpscan --url https://aptabase.bitegg.co/ --enumerate u --random-user-agent --force --max-scan-duration 60
Scan time
55s
Quick report
Order full scan ($19/one time)
Scan date
13 Jan 2025 15:00
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks vulnerability scanners. For get true positive results add wpscan.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:
Max Scan duration: