您需要了解的WordPress漏洞以及如何修復它們

by Joel S. Syder

喬爾·賽德(Joel S.Syder)

您需要了解的WordPress漏洞以及如何修復它們 (WordPress vulnerabilities you need to know about — and how to fix them)

WordPress is an incredibly useful and versatile platform for all kinds of blogging. It’s become very popular. Unfortunately, that popularity has brought with it quite a few vulnerabilities that can be exploited by hackers. It’s important that you know about these weaknesses and take measures to prevent their exploitation. Here are six WordPress vulnerabilities you need to know about.

WordPress是適用于各種博客的非常有用且用途廣泛的平臺。 它變得非常流行。 不幸的是,這種流行帶來了很多可以被黑客利用的漏洞。 了解這些弱點并采取措施防止其被利用很重要。 這是您需要了解的六個WordPress漏洞。

WordPress登錄 (WordPress login)

“The easiest way for someone to access your WordPress is by attacking your login. These kinds of brute force attacks are the most common way of having your WordPress compromised. “This method works by guessing your login and password over and over again by using certain software,” advises Martha Goss, WP programmer at WriteMyX and BritStudent.

“某人訪問您的WordPress的最簡單方法是攻擊您的登錄名。 這些暴力攻擊是使WordPress遭到破壞的最常見方法。 “該方法通過使用某些軟件來一遍又一遍地猜測您的登錄名和密碼來起作用,” WriteMyX和BritStudent的 WP程序員Martha Goss建議。

WordPress doesn’t limit the number of login attempts, so brute force attacks can be very effective. Your best defense against this vulnerability is installing a plugin that will limit the number of allowed login attempts, such as iThemes Security Pro. You can also use a password manager to generate random passwords that are much less likely to be guessed. Stay away from passwords that seem obvious — don’t use anything like 123456, password, or anything related to you.

WordPress不會限制登錄嘗試的次數,因此蠻力攻擊可能非常有效。 最好的防御方法是安裝一個插件,該插件將限制允許的登錄嘗試次數,例如iThemes Security Pro。 您還可以使用密碼管理器來生成隨機密碼,這些密碼很少被猜中。 遠離看似顯而易見的密碼-請勿使用123456,密碼或與您相關的任何東西。

For example, no pet names, children names, partner names, street names and so on since all of this can be used against you. If you think that mixing them together may prove to be a better security measure but still fairly easy to remember, think again. Your social media profiles are an easy way into your psychology, and anyone could find these passwords among your posts.

例如,沒有寵物名稱,孩子名稱,伴侶名稱,街道名稱等,因為所有這些都可以對您不利。 如果您認為將它們混合在一起可能是一種更好的安全措施,但仍然很容易記住,請再考慮一下。 您的社交媒體資料是您進入心理的一種簡便方法,任何人都可以在您的帖子中找到這些密碼。

It’s best to choose something unrelated to you — and make sure that you use a good combination of letters, upper case letters, and numbers as well as symbols. You can never be too careful or underestimate your enemy.

最好選擇與您無關的內容,并確保您使用字母,大寫字母,數字以及符號的良好組合。 您永遠不能太小心或低估敵人。

Source: https://www.wordfence.com/blog/2017/12/aggressive-brute-force-wordpress-attack/

資料來源: https : //www.wordfence.com/blog/2017/12/aggressive-brute-force-wordpress-attack/

默認管理員用戶帳戶 (Default admin user account)

Hackers can gain access to the back end of your WordPress account by exploiting your default admin user account. Try deleting your admin account and accessing your site from a common account that has admin privileges. People can gain access by injecting SQL commands using a cookie value parameter. To prevent this kind of compromise, try updating your security software to the most current IPS.

黑客可以通過利用默認的管理員用戶帳戶來訪問WordPress帳戶的后端。 嘗試刪除您的管理員帳戶,并從具有管理員權限的普通帳戶訪問您的網站。 人們可以通過使用cookie值參數注入SQL命令來獲得訪問權限。 為避免這種妥協,請嘗試將安全軟件更新為最新的IPS。

Jibu Pro can also be accessed by cross-site scripting because it doesn’t clear out user-supplied input properly. To guard against this vulnerability, strengthen the permissions on your site. You can even go as far as to hide your admin login so well that no one can find it. The best way to do that — and the simplest one by far — is naming it something else. Admin is quite obvious, and hackers will be searching for that. But if you name it something entirely different — Cat, SpaceMonkey or choose from a wide variety of funny and clever possibilities — the hackers will have a hard time finding it. By default, they will have a much harder time injecting an SQL command — they don’t know where to inject it.

也可以通過跨站點腳本訪問Jibu Pro,因為它不能正確清除用戶提供的輸入。 為防止此漏洞,請增強您網站上的權限。 您甚至可以隱藏自己的管理員登錄信息,以至于沒人能找到。 做到這一點的最佳方法(也是迄今為止最簡單的方法)是將其命名。 管理員是很明顯的,黑客將在搜索它。 但是,如果您將其命名為完全不同的名稱(例如Cat,SpaceMonkey或從各種各樣有趣而機靈的可能性中進行選擇),則黑客將很難找到它。 默認情況下,他們將很難注入SQL命令-他們不知道在哪里注入它。

Source: https://www.acunetix.com/blog/articles/exploiting-sql-injection-example/

資料來源: https : //www.acunetix.com/blog/articles/exploiting-sql-injection-example/

URL黑客 (URL hacking)

“WordPress uses PHP to execute all its server-side scripts, and that, unfortunately, makes it susceptible to URL attacks. It is all too easy for hackers to sneak into WordPress operations and create problems for you,” warns Dorothy Cox, tech writer at 1Day2Write. Because of the nature of its database, there is ample opportunity for hackers to steal your sensitive information. To avoid these breaches, host your WordPress on Apache Web Server, which uses .htaccess files and will protect you from URL hacking.

“ WordPress使用PHP執行所有服務器端腳本,但是不幸的是,這使其容易受到URL攻擊。 1Day2Write的技術作家多蘿西·考克斯(Dorothy Cox)警告說,黑客很容易潛入WordPress操作并為您制造問題。 由于其數據庫的性質,黑客有很多機會竊取您的敏感信息。 為了避免這些破壞,請將您的WordPress托管在使用.htaccess文件的Apache Web服務器上,并保護您免受URL黑客攻擊。

Make sure you uninstall and delete all of the unnecessary plugins that you have on your website. This limits the access points for the hackers — themes could also be your enemy, especially if you have a ton of them that you aren’t using. PHP is all too easy to exploit, and you should protect your website the best you can. As a bonus, those themes and extra plugins may be slowing your loading time down so you would be improving your SEO while protecting your website.

確保卸載并刪除網站上所有不必要的插件。 這限制了黑客的訪問點-主題也可能是您的敵人,特別是如果您有很多不使用的主題。 PHP太容易利用了,您應該盡最大努力保護您的網站。 另外,這些主題和額外的插件可能會減慢加載時間,因此您可以在保護網站的同時改善SEO。

Source: https://blog.websecurify.com/2017/02/hacking-wordpress-4-7-0-1.html

來源: https : //blog.websecurify.com/2017/02/hacking-wordpress-4-7-0-1.html

過時的軟件 (Out of date software)

Any time you’re running your WordPress using outdated software, you run an increased risk of being compromised. It’s easy to fall into the trap of thinking that updates just improve minor bugs and annoyances, but they also are important for the security patches they include.

每當您使用過時的軟件運行WordPress時,遭受威脅的風險都會增加。 很容易陷入思維陷阱,即更新只會改善較小的錯誤和煩惱,但它們對于所包含的安全補丁程序也很重要。

Keeping your software updated is a very easy thing to do, and it will protect you from many hacking threats. If you’re worried, you will forget to update your software, simply install automatic updates with plugins such as iThemes’ WordPress version management. These kinds of features both save you time and ensure you don’t miss a security patch and have your site compromised.

保持軟件更新是一件非常容易的事,它將保護您免受許多黑客威脅的侵害。 如果您擔心,您將忘記更新軟件,只需使用插件即可安裝自動更新,例如iThemes的WordPress版本管理。 這類功能既可以節省您的時間,又可以確保您不會錯過安全補丁并危及您的網站。

Hackers will be looking for something that’s easy to crack. By updating, you are probably installing new security patches which can prevent any hacker from entering. Also, make sure that you don’t install anything from sources that are not safe. You could be inviting the hackers right in.

黑客將尋找易于破解的東西。 通過更新,您可能正在安裝新的安全補丁程序,可以阻止任何黑客進入。 另外,請確保不要從不安全的來源安裝任何東西。 您可能會邀請黑客進入。

Source: https://www.kimiweb.com/wordpress-help/updating-wordpress-and-plugins/

來源: https : //www.kimiweb.com/wordpress-help/updating-wordpress-and-plugins/

數據庫表的默認前綴 (Default prefix for database tables)

There are many tables in the WordPress database, and in many installs, they are named with a default prefix beginning with “wp.” That may not sound like a big deal, but it gives hackers a bit of an advantage because it is one less thing for them to decipher.

WordPress數據庫中有很多表,在許多安裝中,它們都以默認前綴“ wp ”命名。 這聽起來似乎沒什么大不了的,但是它卻給了黑客一些優勢,因為對他們來說解密是一件輕而易舉的事。

You can make things a lot more difficult for them by simply changing these default prefixes. Will it stop every hacker? No, but it will stop a lot, and it’s just one more useful tool in defending your WordPress account. This is a simple process that you can easily do on your own — hackers are always looking for an easy entry point first, and if you eliminate those, they might give up.

只需更改這些默認前綴,就可以使事情變得更加困難。 它會阻止每個黑客嗎? 不,但它會停止很多工作,它只是保護您的WordPress帳戶的另一種有用工具。 這是一個簡單的過程,您可以輕松地自己完成-黑客總是始終在尋找一個簡單的入口點,如果您消除這些入口,他們可能會放棄。

Source: https://www.cloudways.com/blog/change-wordpress-database-table-prefix-manually/

資料來源: https : //www.cloudways.com/blog/change-wordpress-database-table-prefix-manually/

PHP漏洞 (PHP vulnerabilities)

Hackers can gain access to your account by exploiting your PHP code, and it’s more common than you would think. Limit your risk by uninstalling and then deleting any plugins you don’t need. Each one is a potential access point for people looking to compromise your information. Try and avoid using plugins that aren’t being updated anymore; if it’s been more than six months since an update, it’s time to consider just deleting it.

黑客可以通過利用您PHP代碼來訪問您的帳戶,這種情況比您想象的要普遍得多。 通過卸載然后刪除不需要的插件來降低風險。 對于希望破壞您的信息的人們,每個人都是一個潛在的訪問點。 嘗試避免使用不再更新的插件; 如果距更新已超過六個月,那么該考慮將其刪除了。

Source: https://www.cloudways.com/blog/change-wordpress-database-table-prefix-manually/

資料來源: https : //www.cloudways.com/blog/change-wordpress-database-table-prefix-manually/

切換到更好的托管 (Switch to better hosting)

When you are just starting out, the cheapest hosting seems like the best idea. But, cheap hosting also comes with a lack of security features that could be harmful. Make sure that you have the best and the safest hosting in order to protect yourself and your customers.

當您剛開始時,最便宜的托管似乎是最好的主意。 但是,廉價主機還缺少一些可能有害的安全功能。 確保您擁有最好和最安全的托管服務,以保護自己和客戶。

Source: https://www.webhostingsecretrevealed.net/blog/web-hosting-guides/switching-web-host/

來源: https : //www.webhostingsecretrevealed.net/blog/web-hosting-guides/switching-web-host/

結論 (Conclusion)

Keeping your site secure is one of the most important responsibilities when you’re running a WordPress account. Limit the number of tries for your login. Change the default prefixes for your tables. Download the plugins recommended in this article and see how they work for you. WordPress is a great resource for blogging, but just remember that there are plenty of people looking around the site for accounts vulnerable to hacking. Make sure yours isn’t one of them.

當您運行WordPress帳戶時,確保網站安全是最重要的職責之一。 限制嘗試登錄的次數。 更改表的默認前綴。 下載本文推薦的插件,并查看它們如何為您工作。 WordPress是寫博客的好資源,但請記住,很多人在網站上尋找容易受到黑客攻擊的帳戶。 確保您不是其中之一。

Joel Syder is WP coach at Originwritings.com and Australia2write.com. He enjoys helping people to build websites of their dreams as well as creating articles about things that excite him for Academicbrits.com, tutoring service.

Joel Syder是Originwritings.com和Australia2write.com的 WP教練。 他喜歡幫助人們建立自己夢想中的網站,并為Academicbrits.com (補習服務)撰寫有關使他興奮的事情的文章。

翻譯自: https://www.freecodecamp.org/news/wordpress-vulnerabilities-you-need-to-know-about-and-how-to-fix-them-497a2d8b2c3e/

本文來自互聯網用戶投稿,該文觀點僅代表作者本人,不代表本站立場。本站僅提供信息存儲空間服務,不擁有所有權,不承擔相關法律責任。
如若轉載,請注明出處:http://www.pswp.cn/news/392268.shtml
繁體地址,請注明出處:http://hk.pswp.cn/news/392268.shtml
英文地址,請注明出處:http://en.pswp.cn/news/392268.shtml

如若內容造成侵權/違法違規/事實不符,請聯系多彩編程網進行投訴反饋email:809451989@qq.com,一經查實,立即刪除!

相關文章

Maven基礎。

---恢復內容開始--- Maven: 1、概念。 * maven 是一個項目管理工具。 * maven的作用。 1、jar包。依賴管理。將jar包放在jar包倉庫(pom.xml),不需要每個項目都添加jar包。 2、測試。 3、項目發布。 2、使用。 * 下載解壓即可。 * 環境變量配置…

Dinosaur Run - Dinosaur world Games

轉載于:https://www.cnblogs.com/hotmanapp/p/7092669.html

機器學習實際應用_機器學習的實際好處是什么?

機器學習實際應用Some of my previous introductory posts to machine learning and data science were a bit technical. However, my purpose of this post is to explain some of the practical use-cases of ML solely from a non-technical savvy layman’s perspective w…

Javascript的setTimeOut()和setInterval()的定時器用法

Javascript用來處理延時和定時任務的setTimeOut和setInterval函數應用非常廣泛,它們都用來處理延時和定時任務,比如打開網頁一段時間后彈出一個登錄框,頁面每隔一段時間發送異步請求獲取最新數據等等。但它們的應用是有區別的。 setTimeout()…

php隨機生成車牌號,生成汽車牌照

用戶隨機50選1。好的車牌用戶選不到。我目前的做法是這樣的。所有車牌入庫。別人選了狀態就修改為1。下面是入庫程序,想跟大家討論一下,有沒有更好的方式。use Illuminate\Database\Seeder;class LicensePlatesTableSeeder extends Seeder{public functi…

Go_ go mod 命令解決墻的問題

簡介 由于眾所周知的原因,在下載一些庫的時候會下載不了,比如 golang.org/x/... 相關的庫。為此,網上出現了很多解決方案。 從 Go1.11 開始,Go 引入了 module,對包進行管理,通過 go mod 命令來進行相關操作…

leetcode 1319. 連通網絡的操作次數(并查集)

用以太網線纜將 n 臺計算機連接成一個網絡,計算機的編號從 0 到 n-1。線纜用 connections 表示,其中 connections[i] [a, b] 連接了計算機 a 和 b。 網絡中的任何一臺計算機都可以通過網絡直接或者間接訪問同一個網絡中其他任意一臺計算機。 給你這個…

MySQL中choose標簽的用法

先給大家來個SQL語句&#xff1a; choose (when,otherwize) ,相當于java 語言中的 switch ,與 jstl 中 的 choose 很類似。 <select id"getMemberInfo" resultType"java.util.Map" parameterType"java.util.Map" > SELECT …

php hsetnx,HSETNX命令_視頻講解_用法示例-redis編程詞典-php中文網

set英 [set] 美 [s?t]vt.設置;放置&#xff0c;安置;使處于某種狀況;擺放餐具vi.落山;出發;凝結n.集合;一套&#xff0c;一副;布景;電視機adj.固定的;位于…的;頑固的;安排好的第三人稱單數&#xff1a; sets 復數&#xff1a; sets 現在分詞&#xff1a; setting 過去式&am…

用導函數的圖像判斷原函數的單調性

前言 典例剖析 例1(給定\(f(x)\)的圖像&#xff0c;確定\(f(x)\)的單調性&#xff0c;最簡單層次) 題目暫略。 例2(用圖像確定\(f(x)\)的正負&#xff0c;確定\(f(x)\)的單調性&#xff0c;2017聊城模擬) 已知函數\(yxf(x)\)的圖像如圖所示(其中\(f(x)\)是函數\(f(x)\)的導函數…

樸素貝葉斯 半樸素貝葉斯_使用樸素貝葉斯和N-Gram的Twitter情緒分析

樸素貝葉斯 半樸素貝葉斯In this article, we’ll show you how to classify a tweet into either positive or negative, using two famous machine learning algorithms: Naive Bayes and N-Gram.在本文中&#xff0c;我們將向您展示如何使用兩種著名的機器學習算法&#xff…

python3:面向對象(多態和繼承、方法重載及模塊)

1、多態 同一個方法在不同的類中最終呈現出不同的效果&#xff0c;即為多態。 class Triangle:def __init__(self,width,height):self.width widthself.height heightdef getArea(self):areaself.width* self.height / 2return areaclass Square:def __init__(self,size):sel…

蠕變斷裂 ansys_如何避免范圍蠕變,以及其他軟件設計課程的辛苦學習方法

蠕變斷裂 ansysby Dror Berel由Dror Berel 如何避免范圍蠕變&#xff0c;以及其他軟件設計課程的辛苦學習方法 (How to avoid scope creep, and other software design lessons learned the hard way) 從數據科學的角度來看。 (From a data-science perspective.) You’ve got…

leetcode 674. 最長連續遞增序列

給定一個未經排序的整數數組&#xff0c;找到最長且 連續遞增的子序列&#xff0c;并返回該序列的長度。 連續遞增的子序列 可以由兩個下標 l 和 r&#xff08;l < r&#xff09;確定&#xff0c;如果對于每個 l < i < r&#xff0c;都有 nums[i] < nums[i 1] &a…

深入單例模式 java,深入單例模式四

Java代碼 privatestaticClass getClass(String classname)throwsClassNotFoundException {ClassLoader classLoader Thread.currentThread().getContextClassLoader();if(classLoader null)classLoader Singleton.class.getClassLoader();return(classLoader.loadClass(class…

linux下配置SS5(SOCK5)代理服務

SOCK5代理服務器 官網: http://ss5.sourceforge.net/ yum -y install gcc gcc-c automake make pam-devel openldap-devel cyrus-sasl-devel 一、安裝 # tar xvf ss5-3.8.9-5.tar.gz # cd ss5-3.8.9-5 # ./configure && make && make install 二、修改配置文…

劉備和諸葛亮鬧翻:無意說出蜀國滅亡的根源?

導讀&#xff1a;身為管理者&#xff0c;一件事情&#xff0c;自己做是滿分&#xff0c;別人做是八十分&#xff0c;寧可讓人去做八十分&#xff0c;自己也得跳出來看全局。緊抓大權不放&#xff0c;要么自己干到死&#xff0c;要么是敗于戰略&#xff01;&#xff01; 諸葛亮去…

mysql 時間推移_隨著時間的推移可視化COVID-19新案例

mysql 時間推移This heat map shows the progression of the COVID-19 pandemic in the United States over time. The map is read from left to right, and color coded to show the relative numbers of new cases by state, adjusted for population.該熱圖顯示了美國COVID…

leetcode 959. 由斜杠劃分區域(并查集)

在由 1 x 1 方格組成的 N x N 網格 grid 中&#xff0c;每個 1 x 1 方塊由 /、\ 或空格構成。這些字符會將方塊劃分為一些共邊的區域。 &#xff08;請注意&#xff0c;反斜杠字符是轉義的&#xff0c;因此 \ 用 “\” 表示。&#xff09;。 返回區域的數目。 示例 1&#x…

rcu寬限期_如何處理寬限期錯誤:靜默失敗不是一種選擇

rcu寬限期by Rina Artstain通過麗娜阿斯特斯坦 I’ve never really had much of an opinion about error handling. This may come as a shock to people who know me as quite opinionated (in a good way!), but yeah. If I was coming into an existing code base I just d…