Web App Hacking, Part 5: Enumerating Users and Bruteforcing Passwords on Wordpress Sites

Welcome back, my newbie hackers!
In previous articles this section, I showed youhow to find WordPress sitesand how toidentify the vulnerabilities in these sites(WordPress comprises nearly 30% of all websites). In this tutorial, we will usewpscanagain to enumerate the user accounts on that WordPress site and then brute force the passwords on those user accounts.
Step #1 Fire Up Kali
The first step, of course, is to fire up Kali.
Step #2 Enumerating Users
Now that we have Kali up and running, open a terminal. You will remember from the previous tutorial that thewpscantool simply requires the commandwpscanfollowed by -u and the URL of the website  you want to  scan. In this initial exercise, we will be adding just one more option ,--enumerate u
So, our new command  to enumerate users now becomes;
kali > wpscan -u --enumerate u
Let's try it out on one of our "hacker" websites. Let's begin with www.maherhackers.com. To enumerate the users on that site, we can enter;
kali > wpscan -u www.maherhackers.com --enumerate u
The script will begin to run and will give you voluminous output regarding the modules and potential vulnerabilities on that site. Eventually, it will enumerate the all the users registered to that site.
As we can see above, it found only one user with the name "Vinod" and the Login "v3king". as he is the only user, he is likely the admin.
Let's try the same on the other "hacker" website, http://ift.tt/2pZeKko.
kali > wpscan -u http://ift.tt/2pZeKko --enumerate u
As we can see, wpscan found three (3) users on that site, "wh1ter0se", "pedro", and "info-tech". In this case, "wh1ter0se" is likely the admin.
Step #3 Brute forcing Passwords
Now that we know who  are registered  users on these WordPress-based website, we can begin the process of brute forcing their passwords. Brute forcing passwords can be a time consuming and tedious process, but for people who use dictionary and simple passwords it can pretty work well and we only need to find one user with a weak password.
Part of the beauty of using brute forcing on WordPress sites is that there usually is not lock out, so you can try hundreds, thousands and maybe even millions of passwords until you are successful.
When brute forcing the passwords of a WordPress site, the syntax is;
kali > wpscan -u --wordlist --username
The two keys here are the wordlist and the username. Since we have the username, all that is left is the wordlist. Brute force password cracking is only as good as your wordlist. There are numerous wordlists built into  Kali and even more that can be downloaded off the web. I always recommend using small wordlists with common passwords first. No point in spending hours or days attempting millions of passwords, if the password is "p@ssw0rd".
Kali has numerous password lists that can be located by entering;
kali > locate wordlists
You can use any of these, but I often use a list of common passwords first such as 500-worst-passwords.txt that is available for download from several places on the web. These easy and common passwords are always the place to start before advancing to larger, more complex  and more difficult passwords.
For the first site that we enumerated the users from above, www.maherhackers.com, the command to brute force the password of "v3king"would be;
kali > wpscan -u www.maherhackers.com --wordlist /root/Downloads/500-worst-passwords.txt --username v3king
Press ENTER andwpscanwill repeatedly attempt all 500 passwords on the list. This should only take a few minutes.
In this case, wpscan  was unable to find the password among the 500 worst passwords. The next step then is to use a different and larger wordlist such as rockyou.txt. Using this much larger list can take hours and even days, though. Other alternatives might be tocreate a custom wordlist using crunchorscraping the website with CeWLfor words that might be meaningful to site's owner and creating a wordlist from these.
If brute forcing the password fails, you may be left to use one of the many exploits designed to compromise WordPress sites. That is exactly where we will be going next in this webapp hacking series, so make certain to come back for Part 6.


from hackers-arise full article here