rpckiller
This script checks for any possible SSRF dns/http interactions in xmlrpc.php pingback feature and with that you can further try to escalate it to -
- Internal Port scans
- DOS [HTTP Reflection attack]
- brute force attacks
- Disclose sensitive info disclosure [case by case]
Installation
pip3 install urllib3 requests
Usage
python3 rpckiller.py http(s)://target/xmlrpc.php collab.net/localhost:port '/endpoint/'
Note
This script does Out of Band detection using the burp collaborator or you can use any other service , also you can check for port scans by adding a list of ports and automate it and look at the response on the screen. If the int value is greater than 0 then port is Open as we assume .
"This script does the basic check so make sure to have a good list of endpoints gathered from the target you testing in order to get proper interaction"
Developer
References
https://shahjerry33.medium.com/cross-site-port-attack-a-strangers-call-c2467f93792f
https://www.a10networks.com/blog/wordpress-pingback-attack/