The information provided on davidxia.com is to be used for educational purposes only. I’m not responsible for any misuse of this information. The following is meant to help you develop a cracking defensive attitude to prevent such attacks. In no way should you use this information to cause any kind of damage directly or indirectly.
I started writing a Python script for brute forcing WordPress’ login page. Then I found this script by PuRiCeL. I modified it a bit.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 |
|
And here’s an example wordlist.
Here’s how to use the script.
- Find the login url. It usually ends in wp-login.php. You can Google dork it with
inurl:wp-login.php
- Guess a valid username. “admin” is a common one. Variations on the name of the webmaster might also work.
- Run
python wp-brute.py
This brute force attack only works on self-hosted WordPress sites. Those hosted on wordpress.com will lock you out if you try too many times. Step 2 above is possible because WordPress shows different error messages for invalid usernames and invalid passwords. This basic security flaw lets crackers know what usernames are valid.
Here are ways to prevent WordPress from getting hacked:
- Smashing magazine’s article on 10 ways to harden your wordpress site’s security
- One of the ways is to create a child theme and add this to the child theme’s functions page:
1
|
|