Skip to content

arale61/MagentoLoginBruteForce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Yet another Magento Login Bruteforcer

Just for convenience and as a PoC.

Tested with

This script is tested against:

  • Magento ver. dev-2.4-develop
  • python 3.11.4

How to install

# Clone repository
git clone https://github.com/arale61/MagentoLoginBruteForce.git
# get into directory
cd ./MagentoLoginBruteForce/
# enable a virtual environment, clean work
python -m venv .venv
# activate virtual environment
source ./.venv/bin/activate
# install requirements in virtual environment.
# No collision with native OS python libs.
python -m pip install -r requirements.txt

Whenever you like to exit the environment, just type:

deactivate

How it works

python magentoBf.py -h

usage: magentoBf.py [-h] [-u U] [-w W] [-m M] [-t T] [-d] url

Yet another Magento login Bruteforce script.

positional arguments:
  url         The url where the Magento login is located

options:
  -h, --help  show this help message and exit
  -u U        The username to bruteforce the password. Defaults to admin
  -w W        The password wordlist fullpath to use
  -m M        Number. Max concurrent calls to try to schedulle. Defaults to 100.
  -t T        Number. Time to wait between max concurrent blocks. Defaults to 1 secs.
  -d          For debugging. Prints out some traces.

Demo

Created for and used with Ignition box in HTB.

python magentoBf.py http://ignition.htb/admin -u admin -w /opt/SecLists/Passwords/xato-net-10-million-passwords-10000.txt

Demo bruteforce ignition

About

Yet another Magento Login Bruteforce script.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages