Web Application Security

WPCracker – WordPress User Enumeration And Login Brute Force Tool

 

WordPress user enumeration and login Brute Force tool for Windows and Linux

With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how large password batches each thread is tested at a time. However, too much attack power can cause the victim’s server to slow down.

For example, When I attacked to my local server, it takes about two days to go through the rockyou.txt (14,341,564 unique passwords) when I used the program’s presets for the number of threads (12) and the size of the batches (1000).

In this article, “victim” refers to the attacked WordPress site in pentest lab. Attacking a WordPress site for which you do not have permission may be illegal.

Using:

User Enumeration

.WPCracker.exe --enum -u <Url to victims WordPress page> -o <Output file path (OPTIONAL)>

OR JUST

.WPCracker.exe --enum

In this case, the program only requests the required information

Brute Force

Using program’s presets

.WPCracker.exe --brute -u <Url to victims WordPress page> -p <Path to wordlist> -n <Username> -o <Output file path (OPTIONAL)>

OR JUST

.WPCracker.exe --brute

In this case, the program only requests the required information

Using with custom settings

.WPCracker.exe --brute -u <Url to victims WordPress page> -p <Path to wordlist> -n <Username> -t <Max threads> -c <Batch maximum size>

Get help

.WPCracker.exe --brute -?

This is for ethical use only 🙂

Thank’s for adamabdelhamed’s PowerArgs

 


To Top

Pin It on Pinterest

Share This