/wp-content/uploads/wpo/server-signature/on/test.php-
/wp-content/uploads/wpo/add-type/request-me.test-
/wp-content/uploads/wpo/directory-index/
In fact the hole wpo file looks to be useless and you where made aware about this 10 months ago?
wp-content/uploads/wpo/module-loaded/rewrite/content-digest/request-me.txt
contents: “thanks”.
wp-content/uploads/wpo/module-loaded/mime/content-digest/request-me.txt
contents: “thanks”.
wp-content/uploads/wpo/module-loaded/headers/content-digest/request-me.txt
contents: “thanks”.
wp-content/uploads/wpo/module-loaded/headers/content-digest/request-me.txt
contents: “thanks”.
/wp-content/uploads/wpo/content-digest/on/request-me.txt
contents: “hi”
I mean what’s the point? Unless you love a vulnerable script?
]]>Recently found that that xmlrpc.php accepts POST requests.
Could it be possible to block the file from the outside and only allow it for WordPress to have pingbacks and trackbacks.
https://www.ads-software.com/plugins/all-in-one-wp-security-and-firewall/
]]>My website justhi5.com is compromising with an issue, Bellow is the message i have received from my hosting company, Kindly let me know what i can do to solve this issue and and lift the ban from my account.
Your account has been abusing CPU resources for an extended period of time and has been disabled in order to ensure continued performance stability of the account and server. While we do limit each account to no more than 25% of a system’s CPU in our terms of service, we do not actively disable accounts until they greatly exceed that number, which is what happened in this case.
]]>For the past days I encounter on one of my Wp site an massive attack. On the logs this shows every 1-2 minutes, every time there is another IP address. So far I’ve banned using fail2ban about 1000 IP’s almost all coming from Russia.
The thing is that this attack is some kind of stupid as clearly it has an 404 on “/-/-/” part, and the wp-login is no longer called this way(renamed with an plugin).
So the only inconvenient is the bandwidth consumption. Is there any solution to this attack?
91.204.196.58 - - [26/Jun/2015:13:46:21 +0300] "GET /wp-login.php HTTP/1.1" 301 - "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0"
91.204.196.58 - - [26/Jun/2015:13:46:22 +0300] "GET /-/-/-/-/-/-/-/-/-/- HTTP/1.1" 404 14730 "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0"
]]>I had been using WordPress, for blogging about bread making, for many years and between 2011 to 2103 my WP site was badly hacked several times. As a result, I decide for once and for all to try to put an end to all the hackers. After almost 2 years of development and testing the anti-hacking firewall for WordPress sites, I have put it up for sale at other forums, it is called The Bad Bot Exterminator. It was designed to block known and unknown bad bots and hackers.
It comes with a free cache controller, the SuperFast Cache, a WP plugin. When both, the Bad Bot Exterminator and the SuperFast Cache were implemented at my website there were good performance improvements to the WordPress blog.
The improvements are:-
1. One of my WP post webpages download times had amazingly improved from 12 seconds to 4 seconds – the results were generated by testing on GTmetrix. Generally all my WP webpages download times improved by a factor of x2 to x3.
2. It has been so effective over the last few months it has block 147 bad bots & hackers and blocked 1 DDoS attack (they could not crash my site) and
3. As a result of installing both programs on my WordPress website, my server CPU usage has dropped from 3 – 5% range to 1.4 – 1.8% range even though I have been having about 500 visitors per day for a very long time.
It allows you to LOCK up your WP site so that no one can log in into your WP site. I have had many hackers trying to log into my site for years but all have failed.
One of my customers just informed me that “Future security updates will be applied automatically”. What does this mean? Will it automatically update and overwrite all WP scripts? Is there a way to stop this from occurring? That is WP will not upgrade until the web publisher clicks on upgrade button?
Unfortunately if WordPress is upgraded automatically there may be a loss of the firewall if the firewall is not turned off before WP upgrading. The Bad Bot Exterminator was written as a firewall and not as a plugin so it has to be turned off before WP can be upgraded. Subsequently, after upgrading WP the firewall can be turned on.
Can WP developers have a button, in the WP DashBoard, for my clients to select whether they want automatic upgrades or manually activated upgrades or don’t implement automatic upgrades? This will allow them to turn off the Bad Bot Exterminator Firewall before they begin the WP upgrade.
]]>My wordpress site is getting unfamiliar kind of visitors.
I got everyone minute 20 unknown visitors from different countries who request /xmlrpc.php.
Check the photo please : https://i.imgur.com/nmx4AVD.jpg
What can i do please?
]]>