All Projects → aress31 → xmlrpc-bruteforcer

aress31 / xmlrpc-bruteforcer

Licence: Apache-2.0 license
Multi-threaded XMLRPC brute forcer using amplification attacks targeting WordPress installations prior to version 4.4.

Programming Languages

python
139335 projects - #7 most used programming language
Dockerfile
14818 projects

Projects that are alternatives of or similar to xmlrpc-bruteforcer

BruteSniffing Fisher
hacking tool
Stars: ✭ 24 (-66.2%)
Mutual labels:  bruteforce
AzureAD Autologon Brute
Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
Stars: ✭ 90 (+26.76%)
Mutual labels:  bruteforce
psolving-paradigms
Common problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (-52.11%)
Mutual labels:  bruteforce
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+314.08%)
Mutual labels:  bruteforce
Hades
The best way to hack into VMware accounts.
Stars: ✭ 61 (-14.08%)
Mutual labels:  bruteforce
FBM-134
Hack Facebook Account Brute Force Method
Stars: ✭ 27 (-61.97%)
Mutual labels:  bruteforce
Mercury
Mercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (+232.39%)
Mutual labels:  bruteforce
Papaya
NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.
Stars: ✭ 22 (-69.01%)
Mutual labels:  bruteforce
urlbuster
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (+102.82%)
Mutual labels:  bruteforce
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-78.87%)
Mutual labels:  bruteforce
BruteForce
A simple brute forcer written in GO for SHA1, SHA256, SHA512, MD5 and bcrypt
Stars: ✭ 49 (-30.99%)
Mutual labels:  bruteforce
Brute-Force-Login
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+225.35%)
Mutual labels:  bruteforce
RedLogin
Red Login: SSH Brute-force Tools
Stars: ✭ 99 (+39.44%)
Mutual labels:  bruteforce
weakpass generator
generates weak passwords based on current date
Stars: ✭ 36 (-49.3%)
Mutual labels:  bruteforce
Crackerjack
Multiprocessing brute-force script written in Python 3
Stars: ✭ 22 (-69.01%)
Mutual labels:  bruteforce
phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
Stars: ✭ 58 (-18.31%)
Mutual labels:  bruteforce
pdfbruter
This is an offline password cracking Tools which cracks any PDF which are password protected using an inbuilt wordlist Dictionary.!
Stars: ✭ 30 (-57.75%)
Mutual labels:  bruteforce
ComPP
Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
Stars: ✭ 44 (-38.03%)
Mutual labels:  bruteforce
Brutegram
Instagram multi-bruteforce Platfrom
Stars: ✭ 183 (+157.75%)
Mutual labels:  bruteforce
peer-id-generator
Vanity public key generator for use with IPFS and IPNS
Stars: ✭ 27 (-61.97%)
Mutual labels:  bruteforce

XML-RPC Bruteforce Attacks

xmlrpc-bruteforcer

Language License

Bruteforcing CMS users' passwords via the XMLRPC interface.

This script is a PoC for the "Brute Force Amplification Attack" exploit against XMLRPC interfaces enabling the system.multicall() method (enabled by default).

The system.multicall() method allows multiple calls to be sent within a single HTTP request. Using this "wrapper", malicious attackers can carry out a large number of login attempts (bruteforce) with a minimal network impact, consequently making them stealthier and more efficient.

At the moment, the maximum number of calls which can be encapsulated within the system.multicall() method without triggering a networking error is 1999 calls meaning that for each HTTP request sent 1999 different login attempts are performed.

More information about the bruteforce amplification attack can be found at:

https://blog.cloudflare.com/a-look-at-the-new-wordpress-brute-force-amplification-attack/

Vulnerable CMS

Script sucessfully tested against WordPress versions < 4.4

Installation

$ git clone https://github.com/AresS31/xmlrpc-bruteforcer
$ cd xmlrpc-bruteforcer
$ pip install -r requirements.txt

Docker

$ git clone https://github.com/AresS31/xmlrpc-bruteforcer && cd xmlrpc-bruteforcer
$ docker build -t xmlrpc-bruteforcer .
$ docker run --rm -v $(pwd):/wordlists xmlrpc-bruteforcer -u admin -w /wordlists/wordlist.txt -t 3 -x https://wordpress.local/xmlrpc.php

Usage

$ python3 xmlrpc-bruteforce.py -u [username] -w [wordlist] -x [xmlrpc_intf] -t [threads_number] -c [chunks_size] -v [verbose] -h [help]
[-u]: username of the targeted user, required
[-w]: wordlist containing the passwords to try, required
[-x]: xmlrpc interface to attack, required
[-t]: number of threads to run, optional, default value: 5 
[-c]: number of calls to encapsulate within a system.mullticall() call, optional, default value: 1999
[-v]: print debugging information, optional, default value: False
[-h]: print help

Dependencies

Third-party libraries

colorama 0.3.7:

The python3-colorama package is required.

https://pypi.python.org/pypi/colorama

tqdm 4.8.4:

The python3-tqdm package is required.

https://pypi.python.org/pypi/tqdm

Possible Improvements

  • Debug the tqdm, sys.stdout printing issues.
  • Improve the source code quality.

License

Copyright (C) 2016 Alexandre Teyar

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].