🚨 Stop the presses! A cache ratio "detective" discovers 288,493 requests and becomes the Sherlock Holmes of XML-RPC brute force attacks. 🕵️‍♂️🔍 Because apparently, no one else noticed the tsunami of POST requests from a single IP until the cache ratio whispered the secret. 🤦‍♂️🌊
https://marcindudek.dev/blog/xmlrpc-brute-force-cache-rate/ #cachedetective #XMLRPC #brute-force #security #SherlockHolmes #technews #HackerNews #ngated
288,493 Requests in 24 Hours — How I Spotted an XML-RPC Brute Force via Cache Rate

A 0.8% Cloudflare cache ratio led me to a single Singapore IP flooding a WordPress site with 288k xmlrpc.php requests. Detection, vector, and two-layer mitigation.

288,493 Requests in 24 Hours — How I Spotted an XML-RPC Brute Force via Cache Rate

A 0.8% Cloudflare cache ratio led me to a single Singapore IP flooding a WordPress site with 288k xmlrpc.php requests. Detection, vector, and two-layer mitigation.

Ich habe mir vorgenommen, wieder häufiger zu bloggen und bin dabei direkt in ein Problem gelaufen:
Stolperstein 2FA bei WordPress-Zugriff per XML-RPC (Wordfence)
https://schacknetz.de/stolperstein-2fa-bei-wordpress-zugriff-per-xml-rpc-wordfence/

#Wordpress #Wordfence #2FA #XMLRPC #MarsEdit

after working months on API and architecture improvements, I've published version 0.8.0 of `dxr`, my #xmlrpc implementation for #Rust  

the public API hasn't changed *much*, but it should be nicer to use for some cases. also, internal implementation details no longer leak into the public API - I finally managed to decouple XML de/serialization from the public types 😊

release notes: https://codeberg.org/decathorpe/dxr/releases/tag/v0.8.0

phew, I'm glad this won't be banging around in my head any more.

Cookie monster!