Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

You've Been Hacked, Now What? Getting WordPress Up and Running Again

277 views

Published on

Have a hacked WordPress site? Learn how to clean up your site manually, restore from a backup, and keep it from happening again.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

You've Been Hacked, Now What? Getting WordPress Up and Running Again

  1. 1. You’ve Been Hacked. Now What? Getting WordPress Up and Running Again
  2. 2. Jeremy Green @greenhornet79 endocreative.com
  3. 3. [photo of freaked out]
  4. 4. Where Do I Begin?
  5. 5. 1. Backup Hacked Site Files
  6. 6. • Site files • Database
  7. 7. 2. Got Shared Hosting?
  8. 8. your site infected site infection server
  9. 9. 3. Update FTP and MySQL Passwords
  10. 10. Option #1 Restore From a Backup
  11. 11. Manual Method
  12. 12. 1. Drop infected database tables
  13. 13. 2. Import Clean Database Tables
  14. 14. 3. Delete Infected Site Files
  15. 15. 4. Upload Clean Site Files
  16. 16. 5. Enter URL and Database Settings
  17. 17. Using BackupBuddy
  18. 18. 1. Find Backup and ImportBuddy Files
  19. 19. 2. Upload Files to Your Server
  20. 20. 3. Navigate to ImportBuddy URL
  21. 21. 4. Choose Backup File
  22. 22. 5. Enter URL and Database Settings
  23. 23. 5. Enter URL and Database Settings
  24. 24. That’s great, but…
  25. 25. I don’t have a backup… I don’t have a backup…
  26. 26. Option #2 Start From Scratch
  27. 27. 1. Download Everything Fresh
  28. 28. WordPress
  29. 29. Plugins
  30. 30. Theme
  31. 31. 2. Delete WP files on Your Server
  32. 32. 3. Upload Fresh Files
  33. 33. 4. Move Uploads Folder
  34. 34. 5. Go to yoursite.com
  35. 35. 6. Update WP Admin Passwords
  36. 36. 5. Enter URL and Database Settings
  37. 37. That’s great, but…
  38. 38. I have a custom theme/plugin/etc…
  39. 39. Check Theme Files for Backdoors • eval() • base64() • <iframe>
  40. 40. Check Theme Files for Backdoors
  41. 41. Sort Files by Date Modified
  42. 42. Check for Suspicious Files
  43. 43. 5. Enter URL and Database Settings
  44. 44. That’s great, but…
  45. 45. Hire a professional.
  46. 46. Jeremy Green @greenhornet79 endocreative.com

×