mirror of
https://github.com/nmap/nmap.git
synced 2025-12-08 13:41:29 +00:00
Clean up some typos and differences. Most have been normalized to whatever form of the name occurred in the largest number of scripts. Paulino was contacted directly and requested his email be added to all of his credits.
137 lines
4.8 KiB
Lua
137 lines
4.8 KiB
Lua
local brute = require "brute"
|
|
local creds = require "creds"
|
|
local http = require "http"
|
|
local shortport = require "shortport"
|
|
local stdnse = require "stdnse"
|
|
|
|
description = [[
|
|
performs brute force password auditing against Wordpress CMS/blog installations.
|
|
|
|
This script uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are
|
|
stored using the credentials library.
|
|
|
|
Wordpress default uri and form names:
|
|
* Default uri:<code>wp-login.php</code>
|
|
* Default uservar: <code>log</code>
|
|
* Default passvar: <code>pwd</code>
|
|
]]
|
|
|
|
---
|
|
-- @usage
|
|
-- nmap -sV --script http-wordpress-brute <target>
|
|
-- nmap -sV --script http-wordpress-brute
|
|
-- --script-args 'userdb=users.txt,passdb=passwds.txt,http-wordpress-brute.hostname=domain.com,
|
|
-- http-wordpress-brute.threads=3,brute.firstonly=true' <target>
|
|
--
|
|
-- @output
|
|
-- PORT STATE SERVICE REASON
|
|
-- 80/tcp open http syn-ack
|
|
-- | http-wordpress-brute:
|
|
-- | Accounts
|
|
-- | 0xdeadb33f:god => Login correct
|
|
-- | Statistics
|
|
-- |_ Perfomed 103 guesses in 17 seconds, average tps: 6
|
|
--
|
|
-- @args http-wordpress-brute.uri points to the file 'wp-login.php'. Default /wp-login.php
|
|
-- @args http-wordpress-brute.hostname sets the host header in case of virtual
|
|
-- hosting
|
|
-- @args http-wordpress-brute.uservar sets the http-variable name that holds the
|
|
-- username used to authenticate. Default: log
|
|
-- @args http-wordpress-brute.passvar sets the http-variable name that holds the
|
|
-- password used to authenticate. Default: pwd
|
|
-- @args http-wordpress-brute.threads sets the number of threads. Default: 3
|
|
--
|
|
-- Other useful arguments when using this script are:
|
|
-- * http.useragent = String - User Agent used in HTTP requests
|
|
-- * brute.firstonly = Boolean - Stop attack when the first credentials are found
|
|
-- * brute.mode = user/creds/pass - Username password iterator
|
|
-- * passdb = String - Path to password list
|
|
-- * userdb = String - Path to user list
|
|
--
|
|
-- Based on Patrik Karlsson's http-form-brute
|
|
--
|
|
|
|
author = "Paulino Calderon <calderon@websec.mx>"
|
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
|
categories = {"intrusive", "brute"}
|
|
|
|
|
|
portrule = shortport.http
|
|
|
|
local DEFAULT_WP_URI = "/wp-login.php"
|
|
local DEFAULT_WP_USERVAR = "log"
|
|
local DEFAULT_WP_PASSVAR = "pwd"
|
|
local DEFAULT_THREAD_NUM = 3
|
|
|
|
---
|
|
--This class implements the Driver class from the Brute library
|
|
---
|
|
Driver = {
|
|
new = function(self, host, port, options)
|
|
local o = {}
|
|
setmetatable(o, self)
|
|
self.__index = self
|
|
o.host = stdnse.get_script_args('http-wordpress-brute.hostname') or host
|
|
o.port = port
|
|
o.uri = stdnse.get_script_args('http-wordpress-brute.uri') or DEFAULT_WP_URI
|
|
o.options = options
|
|
return o
|
|
end,
|
|
|
|
connect = function( self )
|
|
-- This will cause problems, as ther is no way for us to "reserve"
|
|
-- a socket. We may end up here early with a set of credentials
|
|
-- which won't be guessed until the end, due to socket exhaustion.
|
|
return true
|
|
end,
|
|
|
|
login = function( self, username, password )
|
|
-- Note the no_cache directive
|
|
stdnse.print_debug(2, "HTTP POST %s%s\n", self.host, self.uri)
|
|
local response = http.post( self.host, self.port, self.uri, { no_cache = true }, nil, { [self.options.uservar] = username, [self.options.passvar] = password } )
|
|
-- This redirect is taking us to /wp-admin
|
|
if response.status == 302 then
|
|
local c = creds.Credentials:new( SCRIPT_NAME, self.host, self.port )
|
|
c:add(username, password, creds.State.VALID )
|
|
return true, brute.Account:new( username, password, "OPEN")
|
|
end
|
|
|
|
return false, brute.Error:new( "Incorrect password" )
|
|
end,
|
|
|
|
disconnect = function( self )
|
|
return true
|
|
end,
|
|
|
|
check = function( self )
|
|
local response = http.get( self.host, self.port, self.uri )
|
|
stdnse.print_debug(1, "HTTP GET %s%s", stdnse.get_hostname(self.host),self.uri)
|
|
-- Check if password field is there
|
|
if ( response.status == 200 and response.body:match('type=[\'"]password[\'"]')) then
|
|
stdnse.print_debug(1, "Initial check passed. Launching brute force attack")
|
|
return true
|
|
else
|
|
stdnse.print_debug(1, "Initial check failed. Password field wasn't found")
|
|
end
|
|
|
|
return false
|
|
end
|
|
|
|
}
|
|
---
|
|
--MAIN
|
|
---
|
|
action = function( host, port )
|
|
local status, result, engine
|
|
local uservar = stdnse.get_script_args('http-wordpress-brute.uservar') or DEFAULT_WP_USERVAR
|
|
local passvar = stdnse.get_script_args('http-wordpress-brute.passvar') or DEFAULT_WP_PASSVAR
|
|
local thread_num = stdnse.get_script_args("http-wordpress-brute.threads") or DEFAULT_THREAD_NUM
|
|
|
|
engine = brute.Engine:new( Driver, host, port, { uservar = uservar, passvar = passvar } )
|
|
engine:setMaxThreads(thread_num)
|
|
engine.options.script_name = SCRIPT_NAME
|
|
status, result = engine:start()
|
|
|
|
return result
|
|
end
|