1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
https://crowdshield.com
444 stars 198 forks source link

error #5

Closed kmilmoon closed 8 years ago

kmilmoon commented 8 years ago

Morning,

I'm trying to use the script, but I don't receive the results because the scripts give me an error.

./wordpress-xmlrpc-brute.py http://xxxxxxxxxxxxxxxxxxx/xmlrpc.php passwords.txt admin

.
/ \ / \
| _/ ____ __ __ \ \/\/ / / \ \ / | ____ \ \ / \ / / / / \ / ( <> ) | | \/ / // | | |> > | | \/ \ __/ \ \ /\ / __/ || __ | | / || > / > / > \/ \/ |__| \/ \/ \/

    \ /       _  _  __    _  _    ___ __    __ _  _  __ __
     X |V||  |_)|_)/     |_)|_)| | | |_    |_ / \|_)/  |_ 
    / \| ||__| \|  \__   |_)| \|_| | |__   |  \_/| \\__|__
1N3 commented 8 years ago

Hi, HTTPError: HTTP Error 403: Forbidden is from the server which means the site has either been patched or has a security plugin blocking XMLRPC. Not much you can do outside of this.