<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hackers Archives - Procudo</title>
	<atom:link href="https://procudo.hr/en/tag/hackers-en/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Driven by Technology</description>
	<lastBuildDate>Thu, 02 Jun 2016 13:03:04 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.4</generator>
	<item>
		<title>WordPress – How to protect yourself against hackers?</title>
		<link>https://procudo.hr/en/wordpress-how-to-protect-yourself-against-hackers/</link>
					<comments>https://procudo.hr/en/wordpress-how-to-protect-yourself-against-hackers/#respond</comments>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 07 Apr 2016 17:09:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://novi.procudo.hr/?p=3549</guid>

					<description><![CDATA[<p>&#160; Definition of the problem &#160; In this article there will be elements of brute force on web sites that are created inside of wordpress. Facts which indicate that web site is compromised will be shown throught article, also it will be explained how to protect yourselfe against brute force. &#160; Introduction &#160; Web site which are we using as an example is our client...</p>
<p>The post <a href="https://procudo.hr/en/wordpress-how-to-protect-yourself-against-hackers/">WordPress – How to protect yourself against hackers?</a> appeared first on <a href="https://procudo.hr/en/home">Procudo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<h4><span style="color: #333333;">Definition of the problem</span></h4>
<p>&nbsp;</p>
<p>In this article there will be elements of brute force on web sites that are created inside of wordpress. Facts which indicate that web site is compromised will be shown throught article, also it will be explained how to protect yourselfe against brute force.</p>
<p>&nbsp;</p>
<h4><span style="color: #333333;">Introduction</span></h4>
<p>&nbsp;</p>
<p>Web site which are we using as an example is our client and it will not be named.</p>
<p>&nbsp;</p>
<h4><span style="color: #333333;">Problem analysis</span></h4>
<p>&nbsp;</p>
<p>The easiest way to detect brute force on web site is throught IT security. The trick is that there is an option settings inside IT security, throught which you can get notifications if someone is trying to get into your site. Only thing that is required is to write your e-mail in textbox bellow.</p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-3249 size-full" src="https://procudo.hr/wp-content/uploads/2016/03/Screen-Shot-2016-03-23-at-19.04.38.png" alt="" width="915" height="341" srcset="https://procudo.hr/wp-content/uploads/2016/03/Screen-Shot-2016-03-23-at-19.04.38.png 915w, https://procudo.hr/wp-content/uploads/2016/03/Screen-Shot-2016-03-23-at-19.04.38-300x112.png 300w, https://procudo.hr/wp-content/uploads/2016/03/Screen-Shot-2016-03-23-at-19.04.38-768x286.png 768w" sizes="(max-width: 915px) 100vw, 915px" /></p>
<p>&nbsp;</p>
<p>If this option is not included, it is difficult to notice that someone is trying to compromised your website, as long as your site does not collapse or somethig like that.</p>
<p>&nbsp;</p>
<p>Mainly the lack of free space on hosting provider is the reason for some web site to collapse and accumulation of new data leads to such situations. Primarily to the lack of space on the hosting provider leads the accumulation of logs.</p>
<p>&nbsp;</p>
<p>We are talking about huge amounts of an attempts to logging on to the admin section of WordPress, and a constant lockout of an admin section of the page.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="wp-image-3250 size-full aligncenter" src="https://procudo.hr/wp-content/uploads/2016/03/Screen-Shot-2016-03-23-at-19.04.48.png" alt="" width="284" height="182" /></p>
<p style="text-align: center;"><em>Examples of logs after intrusion attempts on the website</em></p>
<p>&nbsp;</p>
<p>The reason that lockout occurs is because the user name can be easily learned by using their ID&#8217;s. Hacker randomly enteres different values of IDs until it reaches the user names. The most common is ID number 1.</p>
<p>&nbsp;</p>
<h4><span style="color: #333333;">Solution to the problem</span></h4>
<p>&nbsp;</p>
<p>In order to ensure against further attacks, it is necessary to implement a part of the code in the .htaccess.</p>
<div>Solution is to implement in .htaccess rewrite rules:</div>
<div style="text-align: justify;">
<pre><code>RewriteCond %{REQUEST_URI} !^/wp-admin [NC]
RewriteCond %{QUERY_STRING} author=\d
RewriteRule ^ /? [L,R=301]</code></pre>
</div>
<p>This code will prevent hackers from reaching the user names. In fact if hacker already used existing user names, it is necessary to change them. User names can be changed in phpMyAdmin under option users. It is only necessary to change user_login but not nicename. Also it is preferable not to have too many user names.</p>
<p>The post <a href="https://procudo.hr/en/wordpress-how-to-protect-yourself-against-hackers/">WordPress – How to protect yourself against hackers?</a> appeared first on <a href="https://procudo.hr/en/home">Procudo</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://procudo.hr/en/wordpress-how-to-protect-yourself-against-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
