• Resolved andyrogers

    (@andyrogers)


    Hi @mbrsolution
    I enabled Rename Login Page, but a hacker has been able to find the username of the Admin and the renamed login page, then tried to sign in, but he got locked out.
    It seems he also removed the ability to change the admin username.
    Does your plugin has a solution to prevent a hacker from obtaining the username and the renamed login page?
    what is the setting to prevent a hacker from finding the Admin username and the WP login page? he even managed to make the admin username permanent (I cannot replace it with another admin)

    how could a hacker find the admin username and manage to sign in WP sign in page?
    is there a way to stop him using your plugin?
    thank you for your help.
    Andy

    • This topic was modified 4 years, 4 months ago by andyrogers.
Viewing 9 replies - 1 through 9 (of 9 total)
  • Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi,

    If you still receive many logging attempts to your admin account, this could be because they are most probably targeting your xmlrpc.php file. This file can be found in the WordPress root directory of your site. Enabling one of the following features can help you reduce or stop further login attempts.

    Completely Block Access To XMLRPC:
    Disable Pinback Functionality From XMLRPC:

    To enable one of the above go to WP Security -> Firewall -> Basic Firewall Rules.

    Let me know if the above helps you.

    Thank you

    Thread Starter andyrogers

    (@andyrogers)

    Sorry @mbrsolution
    it does not work because I have already disabled pingback functionality from xmlrpc (it is already checked) before the last attack.

    Thread Starter andyrogers

    (@andyrogers)

    what would happen if I check completely block access to xmlrpc in addition to disabling pingback functionality from xmlrpc?

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi, you only need to enable one of the two options.

    Now my question to you is. Does the pingback protection work in your site? For example: What happens if you type the following yoursite.com/xmlrpc.php in your browser? Can you let me know know?

    Thank you

    • This reply was modified 4 years, 4 months ago by mbrsolution.
    Thread Starter andyrogers

    (@andyrogers)

    thank you for your response. it is very much appreciated.
    when i entered yoursite.com/xmlrpc.php
    I got this response XML-RPC server accepts POST requests only.

    the hacker must have another way to get the admin username and bypass or get the renamed login page.

    thank you.
    Andy

    Plugin Contributor mbrsolution

    (@mbrsolution)

    Hi,

    when i entered yoursite.com/xmlrpc.php
    I got this response XML-RPC server accepts POST requests only.

    If you choose to enable the following feature Completely Block Access To XMLRPC: instead of Disable Pinback Functionality From XMLRPC: the message received when you enter yoursite.com/xmlrpc.php in the browser address bar should be 403 forbidden apparently.

    Let me know if the above helps you further.

    Thank you

    • This reply was modified 4 years, 4 months ago by mbrsolution.
    Thread Starter andyrogers

    (@andyrogers)

    Hi Mbrsolution
    thank you for your message.
    i completely blocked access to XMLRPC. i checked it, it gave me the message 403 forbidden
    based on this article, users of this plugin should completely block access to xmlrpc.
    https://www.hostinger.com/tutorials/xmlrpc-wordpress
    thank you for your hlep.
    you made my life easier.
    all the best.
    Andy

    Plugin Contributor mbrsolution

    (@mbrsolution)

    I am happy to know ??

    If your issue is resolved, can you mark this support thread as resolved.

    Thank you

    Thread Starter andyrogers

    (@andyrogers)

    Thank you.
    You are helpful.

Viewing 9 replies - 1 through 9 (of 9 total)
  • The topic ‘Hacker is able to get username and try to login wordpress login’ is closed to new replies.