Password Brute Force
Password brute forcing is a common attack that hackers have used in the past against WordPress sites at scale. It’s common to see brute force attacks like this on WordPress sites.
Attackers are looking for users, preferably administrators, with weak passwords to be able to login to WordPress and compromise the site. Depending on the compromised user role, once logged in, the attacker could escalate privileges by attacking other users, embed malicious code into the site or compromise the entire server.
Hackers consolidate lists of compromised passwords into one large list with the most common passwords listed first. The original compromised passwords come from the many data breaches from various organisations. This increases the attacker’s chances as they are no longer guessing random passwords, but using real world data to create a list of the most probable real-world passwords.
One such password list contains the following top 10 passwords:
1. 123456 2. password 3. 123456789 4. 12345678 5. 12345 6. qwerty 7. 123123 8. 111111 9. abc123 10. 1234567
If you are using any of the passwords above, or anything similar to the above, you should change your password right away.
WPScan Brute Force
One of the many features of the WPScan security scanner is password brute forcing. The WPScan CLI (Command Line Interface) tool can be used to iterate over a password list to try to guess a user’s password.
To launch a password brute force attack with WPScan CLI against a WordPress website, the command looks like this:
wpscan --url http://test.local/ --passwords passwords.txt
We pass WPScan the site URL with the
--url parameter, and the password list, in this case named
passwords.txt, with the
In our case, WPScan automatically found three valid WordPress users (
author) and then started to cycle through our password list attempting to login as each of them. As you can see from the screenshot below, WPScan successfully guessed the
admin user’s password, which was
WPScan supports password brute forcing via the traditional wp-login.php page and via the XMLRPC interface, if it is enabled.
Password Brute Force Prevention
The best advice is to not use weak passwords in the first place. Use long and complex passwords that are different for every website that you use. A password manager like OnePassword is a great tool to help you with this.
You can also use have i been pwned? to see if any of your passwords have already been compromised, or sign up to their email alerts to be notified if a password is leaked in the future.
Reputable WordPress security plugins can also help. We would recommend our own WordPress security plugin that emulates a brute force attack and checks privileged users for weak passwords.