1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
449 stars 198 forks source link

Failure at runtime #27

Closed MedAlch closed 6 years ago

MedAlch commented 6 years ago

Hi, When running the tool on a website having a XMLRPC file, I encounter the following error :

Any idea about a fix for this ? :) Thank you very much

MedAlch commented 6 years ago

I ran the script on the same target from a different OS. Here is the output :

Could it be linked to this kind of issue : https://stackoverflow.com/questions/13303449/urllib2-httperror-http-error-403-forbidden ?

1N3 commented 6 years ago

403 means access was denied which usually means the site has been patched.