1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

Ignore SSL Cert #3

Closed madsky closed 8 years ago

madsky commented 8 years ago

Hi - where the site being brute-forced doesn't correctly implement SSL, the code errors.

This Stackoverflow comment holds a solution (http://stackoverflow.com/a/28048260):

with the other import statements

import ssl

following the read-in of the passwords

ctx = ssl.create_default_context() ctx.check_hostname = False ctx.verify_mode = ssl.CERT_NONE

for each incantation of urllib2.urlopen() add the context=ctx argument

urllib2.urlopen(req, context=ctx)

1N3 commented 8 years ago

Thanks, updated the exploit to include the fix.