1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
450 stars 197 forks source link

I need help for read my result Its seem to work on my target but ... #31

Closed lillois59 closed 2 years ago

lillois59 commented 4 years ago

Between these 4 steps I can read a long Doct Html file who finished by : + -- --=[w00t! User found! Wordpress is pwned! a/zmodem.

My question is where is the good password in this html ?

merci les gars !