[mainimage] Unfortunately, the basic sett || WordPress – a convenient platform for the publication of articles and management, which is based on a huge number of different sites. Because of its prevalence, this CMS has long been a tasty morsel for hackers. Unfortunately, the basic settings do not provide an adequate level of protection, leaving many holes uncovered credit default. In this article we will go through a typical “model” hacking site on WordPress, and show how to fix identified vulnerabilities. Today WordPress content management system is the most popular. Its share is 60.4% of the total number of sites using CMS-engines. Of these, according to the statistics, 67.3% of the sites based on the latest version of the software. Meanwhile, in the twelve years of the web engine it was found 242 vulnerabilities of various kinds (excluding vulnerabilities found in third-party plug-ins and themes). A third-party add-ons statistic is even sadder. Thus, the company conducted an analysis in 2350 Revisium Russified templates for WordPress, taken from different sources. As a result, they found that more than half (54%) were infected Web Shell, backdoors, blackhat seo (“spam”) links and
Share This