wordpress
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
wordpress [2016/03/03 16:53] – luke7858 | wordpress [2024/05/23 07:26] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | Common Wordpress Issues | + | ~~NOCACHE~~ |
- | === Wordpress Permissions | + | ====== |
- | Replace ${WP_ROOT} with the directory location of wordpress. If you are already in the wp document root, replace with a dot . | + | {{tabembed> |
- | <sxh bash> | + | |
- | find ${WP_ROOT} -exec chown :apache {} \; | + | |
- | find ${WP_ROOT} -type d -exec chmod 755 {} \; | + | |
- | find ${WP_ROOT} -type f -exec chmod 644 {} \; | + | |
- | </ | + | |
- | \\ | + | |
- | === Changing Site URL === | + | |
- | Check the current URL, first select the database with the ' | + | |
- | <sxh bash> | + | |
- | SELECT * FROM wp_options WHERE option_name = ' | + | |
- | </ | + | |
- | Now we can update the URL: | + | |
- | <sxh bash> | + | |
- | UPDATE wp_options SET option_value = ' | + | |
- | </ | + | |
- | \\ | + | |
- | === .htaccess rewrite === | + | |
- | Used for permalinks | + | |
- | <sxh bash> | + | |
- | RewriteCond %{THE_REQUEST} ^[A-Z]{3,9}\ /(.*)\ HTTP/ [NC] | + | |
- | RewriteCond %{HTTPS} !=on [NC] | + | |
- | RewriteRule ^/? | + | |
- | </ | + | |
- | \\ | + | |
- | === wp-config FTP === | + | |
- | <sxh bash> | + | |
- | define(' | + | |
- | define(' | + | |
- | define(' | + | |
- | define(' | + | |
- | # | + | |
- | # | + | |
- | define(' | + | |
- | define(' | + | |
- | define(' | + | |
- | define(' | + | |
- | </ | + | |
- | \\ | + | |
- | === Auto Install Plugins (without FTP/FTPs details) === | + | |
- | vim / | + | |
- | <sxh bash> | + | |
- | define(' | + | |
- | </ | + | |
- | \\ | + | |
- | === XMLRPC === | + | |
- | To prevent xmlrpc attacks add the following to a .htaccess | + | |
- | <sxh bash> | + | |
- | <Files " | + | |
- | Order Allow, | + | |
- | deny from all | + | |
- | </ | + | |
- | </ | + | |
- | \\ | + | |
- | ==What is an xmlrpc attack?== | + | |
- | xml-rpc can use system.multicall - this can be used to execute multiple methods inside a single request. This allows applications to pass multiple commands with one http request. | + | |
- | \\ | + | |
- | This means that potential bots and hackers can use the system.multicall method to guess 100's or 1000's of passwords with a single http request | + | |
- | \\ | + | |
- | Hackers can attempt thousands of password attempts with just a 3-4 http request. These requests bypass security tools designed to block brute force attempts. These requests will have 1 entry per request in the log file. | + | |
- | \\ | + | |
- | \\ | + | |
- | --- | + | |
- | **__NOTE__**: | + | |
- | \\ | + | |
- | It can be used with Perl, Java, Python, C, C++, PHP and many other programming languages | + | |
- | \\ | + | |
- | \\ | + | |
- | \\ | + | |
- | == JetPack == | + | |
- | This wordpress plugin does come with xmlrcp.php protection from brute force. | + | |
- | \\ | + | |
- | Note: This is SITE specific and will note cover system wide wordpress sites. | + | |
- | \\ | + | |
- | If you are a hosting reseller then you will want to add something similar to the code below, this code allows the wordpress IP range (current IP range) and denies potential attacks: | + | |
- | <sxh bash> | + | |
- | <files xmlrpc.php=""> | + | |
- | Order Deny, | + | |
- | Deny from all | + | |
- | Allow from 192.0.64.0/ | + | |
- | Satisfy All | + | |
- | ErrorDocument 403 http:// | + | |
- | </ | + | |
- | </ | + | |
- | \\ | + | |
- | Jet pack: | + | |
- | https:// | + |
wordpress.1457024000.txt.gz · Last modified: 2024/05/23 07:26 (external edit)