{"id":10240,"date":"2018-05-31T00:00:34","date_gmt":"2018-05-31T00:00:34","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10240"},"modified":"2020-01-08T06:42:17","modified_gmt":"2020-01-08T06:42:17","slug":"content-management-system-scan","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/content-management-system-scan\/","title":{"rendered":"Content Management System Scan"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span><strong>Introduction<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>CMS is a Content Management System that is used to develop websites\/blogs. Some of the most popular CMSs are WordPress, Joomla, and Drupal. Multiple themes and plugins are used in CMS to develop a website and many times these themes and plugins are vulnerable. If you\u2019re using the vulnerable plugins and themes then your website is vulnerable and attackers can easily target your website.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/content-management-system-scan\/#Introduction\" >Introduction<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/content-management-system-scan\/#ESDS_VTMScan_Detection_Techniques\" >ESDS VTMScan Detection Techniques<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<ul class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"360\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/Content-Management-System-Scan-blog.png\" alt=\"\" data-id=\"10241\" data-link=\"https:\/\/www.esds.co.in\/blog\/content-management-system-scan\/content-management-system-scan-blog\/\" class=\"wp-image-10241\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/Content-Management-System-Scan-blog.png 800w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/Content-Management-System-Scan-blog-150x68.png 150w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/Content-Management-System-Scan-blog-300x135.png 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/Content-Management-System-Scan-blog-660x297.png 660w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption>Content Management System Scan<\/figcaption><\/figure><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"ESDS_VTMScan_Detection_Techniques\"><\/span><strong>ESDS VTMScan Detection Techniques<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>First, we detect which CMS is used to build the website and then scan it accordingly. For example, if the target website is built with a WordPress, ESDS VTMScan will run all scans for WordPress. Right now <strong><a href=\"https:\/\/esds.co.in\/security\/vtmscan\">ESDS VTMScan<\/a><\/strong> supports CMSs like WordPress, Joomla, Drupal &amp; vBulletin.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Scans themes, plugins, and unprotected admin area.<\/li><li>User enumeration.<\/li><li>Brute forcing for simple password detection.<\/li><li>FPD \u2013 File Path Disclosure scanning.<\/li><li>Detect CMS in all directories.<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\"><strong><a href=\"https:\/\/esds.co.in\/security\/vtmscan\">Features of ESDS VTMScan<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction CMS is a Content Management System that is used to develop websites\/blogs. Some of the most popular CMSs are WordPress, Joomla, and Drupal. Multiple themes and plugins are used in CMS to develop a website and many times these themes and plugins are vulnerable. If you\u2019re using the vulnerable plugins and themes then your&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/content-management-system-scan\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":10242,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[383,1978,1914,1915,1916,1936,1943,1985],"class_list":["post-10240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-content-management-system","tag-content-management-system-scan","tag-esds-vtmscan","tag-esds-vtmscan-detection-technique","tag-esds-vtmscan-virus-scanner","tag-esds-vtmscan-vulnerability","tag-esds-vtmscan-vulnerability-scanner","tag-esds-vtmscanner"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10240"}],"version-history":[{"count":3,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10240\/revisions"}],"predecessor-version":[{"id":11167,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10240\/revisions\/11167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/10242"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}