Skip to content

dorkerdevil/rpckiller

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

rpckiller

This script checks for any possible SSRF dns/http interactions in xmlrpc.php pingback feature and with that you can further try to escalate it to -

  1. Internal Port scans
  2. DOS [HTTP Reflection attack]
  3. brute force attacks
  4. Disclose sensitive info disclosure [case by case]

Installation

pip3 install urllib3 requests

Usage

python3 rpckiller.py http(s)://target/xmlrpc.php collab.net/localhost:port '/endpoint/'

Note

This script does Out of Band detection using the burp collaborator or you can use any other service , also you can check for port scans by adding a list of ports and automate it and look at the response on the screen. If the int value is greater than 0 then port is Open as we assume .

"This script does the basic check so make sure to have a good list of endpoints gathered from the target you testing in order to get proper interaction"

Developer

D0rkerDevil

References

https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32

https://shahjerry33.medium.com/cross-site-port-attack-a-strangers-call-c2467f93792f

https://www.a10networks.com/blog/wordpress-pingback-attack/

License

MIT

About

xmlrpc.php pingback checker

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages