1N3 / Wordpress-XMLRPC-Brute-Force-Exploit

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield

Home Page:https://crowdshield.com

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Python V 2.7.13 issue?

peterstavrou opened this issue · comments

Is anyone else getting this issue or know how to resolve it?

Traceback (most recent call last):
File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 104, in
if "admin" in attack(entries):
File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 79, in attack
return send_request(url, t)
File "/root/Wordpress-XMLRPC-Brute-Force-Exploit-master/wordpress-xmlrpc-brute-v2.py", line 56, in send_request
rsp = urllib2.urlopen(req,context=ctx)
File "/usr/lib/python2.7/urllib2.py", line 154, in urlopen
return opener.open(url, data, timeout)
File "/usr/lib/python2.7/urllib2.py", line 435, in open
response = meth(req, response)
File "/usr/lib/python2.7/urllib2.py", line 548, in http_response
'http', request, response, code, msg, hdrs)
File "/usr/lib/python2.7/urllib2.py", line 473, in error
return self._call_chain(*args)
File "/usr/lib/python2.7/urllib2.py", line 407, in _call_chain
result = func(*args)
File "/usr/lib/python2.7/urllib2.py", line 556, in http_error_default
raise HTTPError(req.get_full_url(), code, msg, hdrs, fp)
urllib2.HTTPError: HTTP Error 501: Not Implemented

Looks like you're getting HTTP Error 501: Not Implemented which either means the site is patched or XMLRPC logins are disabled.