Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield

NotificationsYou must be signed in to change notification settings

1N3/Wordpress-XMLRPC-Brute-Force-Exploit

Repository files navigation

Wordpress XMLRPC System Multicall Brute Force Exploit by 1N3Last Updated: 20170215https://crowdshield.com

ABOUT:

This is an exploit for Wordpress xmlrpc.php System Multicall function affecting the most current version of Wordpress (3.5.1). The exploit works by sending 1,000+ auth attempts per request to xmlrpc.php in order to "brute force" valid Wordpress users and will iterate through whole wordlists until a valid user response is acquired. It will then selectively acquire and display the valid username and password to login.

USAGE:

./wp-xml-brute http://target.com/xmlrpc.php passwords.txt username1 [username2] [username3]...

LICENSE:

This software is free to distribute, modify and use with the condition that credit is provided to the creator (1N3@CrowdShield) and is not for commercial use.

DONATIONS:

Donations are welcome. This will help fascilitate improved features, frequent updates and better overall support.

  • BTC 1Fav36btfmdrYpCAR65XjKHhxuJJwFyKum
  • DASH XoWYdMDGb7UZmzuLviQYtUGb5MNXSkqvXG
  • ETH 0x20bB09273702eaBDFbEE9809473Fd04b969a794d
  • LTC LQ6mPewec3xeLBYMdRP4yzeta6b9urqs2f

About

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors6

Languages


[8]ページ先頭

©2009-2025 Movatter.jp