1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

Python V 2.7.13 issue? #21

Closed peterstavrou closed 2 years ago

peterstavrou commented 6 years ago

Is anyone else getting this issue or know how to resolve it?

Traceback (most recent call last): File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 104, in if "admin" in attack(entries): File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 79, in attack return send_request(url, t) File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 56, in send_request rsp = urllib2.urlopen(req,context=ctx) File "/usr/lib/python2.7/urllib2.py", line 154, in urlopen return opener.open(url, data, timeout) File "/usr/lib/python2.7/urllib2.py", line 435, in open response = meth(req, response) File "/usr/lib/python2.7/urllib2.py", line 548, in http_response 'http', request, response, code, msg, hdrs) File "/usr/lib/python2.7/urllib2.py", line 473, in error return self._call_chain(args) File "/usr/lib/python2.7/urllib2.py", line 407, in _call_chain result = func(args) File "/usr/lib/python2.7/urllib2.py", line 556, in http_error_default raise HTTPError(req.get_full_url(), code, msg, hdrs, fp) urllib2.HTTPError: HTTP Error 501: Not Implemented

1N3 commented 6 years ago

Looks like you're getting HTTP Error 501: Not Implemented which either means the site is patched or XMLRPC logins are disabled.