""ET SCAN Possible WordPress xmlrpc.php BruteForce in Progress - Response""

SID: 2018755

Revision: 3

Class Type: attempted-admin

Metadata: affected_product Wordpress, affected_product Wordpress_Plugins, attack_target Web_Server, created_at 2014_07_23, deployment Datacenter, signature_severity Major, tag Wordpress, updated_at 2016_01_29

Reference:

Protocol: tcp

Source Network: $HTTP_SERVERS

Source Port: $HTTP_PORTS

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "faultCode"

  • Value: "403"

  • Value: "Incorrect username or password."

Within:

PCRE:

Special Options:

  • file_data

source