1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
449 stars 198 forks source link

I am getting this error #34

Closed SAGEof6iixPATHS closed 2 years ago

SAGEof6iixPATHS commented 3 years ago

Traceback (most recent call last): File "wordpress-xmlrpc-brute-v1.py", line 169, in main(sys.argv) File "wordpress-xmlrpc-brute-v1.py", line 95, in main rsp = urllib2.urlopen(req,context=ctx) File "/usr/lib/python2.7/urllib2.py", line 154, in urlopen return opener.open(url, data, timeout) File "/usr/lib/python2.7/urllib2.py", line 435, in open response = meth(req, response) File "/usr/lib/python2.7/urllib2.py", line 548, in http_response 'http', request, response, code, msg, hdrs) File "/usr/lib/python2.7/urllib2.py", line 473, in error return self._call_chain(args) File "/usr/lib/python2.7/urllib2.py", line 407, in _call_chain result = func(args) File "/usr/lib/python2.7/urllib2.py", line 556, in http_error_default raise HTTPError(req.get_full_url(), code, msg, hdrs, fp) urllib2.HTTPError: HTTP Error 403: Forbidden