cscli scenarios install crowdsecurity/http-wordpress-scan
1type: leaky2name: crowdsecurity/http-wordpress-scan3description: "Detect exploitation attempts against common WordPress endpoints"4filter: |5 evt.Meta.service == 'http' and6 evt.Meta.log_type in ['http_access-log', 'http_error-log'] and7 evt.Meta.http_status in ['404', '403'] and8 Lower(evt.Meta.http_path) contains "/wp-" and9 Lower(evt.Meta.http_path) endsWith ".php"10groupby: evt.Meta.source_ip11distinct: evt.Meta.http_path12capacity: 313leakspeed: "10s"14blackhole: 5m15labels:16 remediation: true17 classification:18 - attack.T159519 behavior: "http:scan"20 label: "WordPress Vuln Hunting"21 spoofable: 022 service: wordpress23 confidence: 324