SlideShare a Scribd company logo
Plugins Part 1:
iThemes Security
JOHN LOCKE
Why Do People Want To Hack Your
Site?
• Malware Downloads
• Run Ads / Page takeovers
• Get User information
• Use your email for spam
• Botnets
• Mining Bitcoin
• Prestige In Hacking Community
WordPress Is A Lucrative Target
• One In Four Websites Run WordPress
• Find Vulnerabilities In WordPress
• Automate Attacks
• Profit!
John Locke
LockedownDesign.com
@Lockedown_ on Twitter

More Related Content

Recently uploaded

Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
kalichargn70th171
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 

Recently uploaded (20)

Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

John locke-word camp-sacramento-2015

  • 1. Plugins Part 1: iThemes Security JOHN LOCKE
  • 2. Why Do People Want To Hack Your Site? • Malware Downloads • Run Ads / Page takeovers • Get User information • Use your email for spam • Botnets • Mining Bitcoin • Prestige In Hacking Community
  • 3. WordPress Is A Lucrative Target • One In Four Websites Run WordPress • Find Vulnerabilities In WordPress • Automate Attacks • Profit!
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.

Editor's Notes

  1. How many of you know someone who’s had a hacked site?
  2. Your site doesn’t need to be huge to be of value to hackers. They can use your blog or small business site for a variety of purposes. They can install malware on your site, which infect people who visit your site. Your site can house ads or even new pages for Viagra, Cialis, gambling, or other unsavory things. They can find information on other people registered to your site. They can use your email server to send spam to other victims. They can use your server resource as part of a botnet to attack other sites, mine Bitcoin, or just get recognition in the hacking community.
  3. WordPress runs one in every four sites on Earth. If hackers can find vulnerabilities in WordPress, and automate attacks, they have the potential to take over hundreds of thousands of sites.
  4. When you first install iThemes Security and go to the Dashboard, you’ll see four calls to action. First, a prompt to make a backup of your database. This is emailed to the administrator email. It’s always best to get backups that are not stored on the server. Because if your server is infected, the database backup on your server is also likely to be infected. Second, will you allow the plugin to update the wp-config and .htaccess files? The plugin uses these to help keep bad guys out. Third, a one-click button for default settings. There are about six settings here that go into effect. We’ll look at those in a minute. Last, Can we observe how you’re using this plugin so we can make improvements to the plugin?
  5. These are the settings we enabled with the one-click settings on the last page. We’ve removed “admin” as a username. When you do a fresh install of WordPress these days, you can choose any username you want. This wasn’t always the case. In years past, it used to default to “admin” as a username. Sites that were launched a few years ago may still have “admin” as a main username. Now hackers only need to guess the password that goes with admin to break into your site. User nicknames are different from the display name. This prevents your username being displayed in plain sight by themes displaying author credits. User profiles with no published posts are also not displayed. This is so dormant accounts don’t become an easy target for hackers. The login page is not giving out information on failed login, like “The username was incorrect” or “The password was incorrect”. We don’t want to give hackers any clues to get into your site. The Windows Live Writer header is also removed.
  6. One of the first things you should always do is white-list your IP address for 24 hours. Since we’re changing the site configuration, we can accidentally lock ourselves out. Whitelisting our IP helps prevent that. I’d like to go over some of these tabs here: Dashboard and Settings help you keep track of what security measures are in place. Advanced are security settings you can use, but have a good backup of your site before you implement these. The Logs tab records details of activity and changes on your site.
  7. This is some of what you will find on your Logs page after a while. Here, it is recording 404 errors, where two different IP’s were hitting 404’s while trying to find a login URL, and also looking for known plugin vulnerabilities for plugins that are not on this site. More on this in a few minutes.
  8. These are settings in the Advanced tab. This setting changes the admin user and changes user 1 to another number. When you install WordPress, who is the first user in the Users database table? That is the administrator. This deflects attacks aimed at the first user in the database.
  9. For those familiar with the wp-config file, the WordPress salts are those random characters attached to logins. When you change the salts, it logs everyone out everywhere. So if someone is logged into your site, they have to log back in.
  10. This setting changes the folder name of the wp-content folder. Many attacks are aimed at plugin and theme vulnerabilities. Where are those located? In the wp-content folder. IF we rename this folder, it prevents automated attacks against those files. Be careful with this one, as it will affect your whole site.
  11. This setting changes the default database table prefix. When you install WordPress, the default prefix is “wp_”. This changes the prefix on those tables, so attacks looking for those specific database tables get derailed. Some managed WordPress hosts will do this automatically for you.
  12. From here on in, we’ll look at the Dashboard, organized into suggested actions by High, Medium, Low, and Completed, and the corresponding places where the Fix It buttons link to in Settings. The first setting says we don’t have regular backups scheduled.
  13. Whn we click the Fix It button, it takes us to scheduling database backups in Settings
  14. You can choose how often you back up your database by how many days in between running backups.
  15. XML-RPC is something used by Jetpack, the mobile app, certain plugins, and Pingbacks.
  16. This used to be one setting, in the last version this became two settings. At the top, you can allow all XML-RPC, disable only Pingbacks, or Disable XML-RPC completely. Pingbacks can also be used in a Ddos, or denial of service attack. The second setting lets you disable multiple username and password combos per authentication. This helps prevent brute force attacks.
  17. In Medium Priority, the first setting is turning on 404 protection.
  18. Remember when I showed you the Logs a minute ago? When we turn on 404 protection, this locks out bad guys looking for things they shouldn’t be looking for, if they hit too many 404’s in a certain time span.
  19. You can set how many 404s it takes to trigger a lockout in how long a time. Also has a white-list for file types, like jpgs, so accidental lockouts due to incorrect file paths.
  20. User with id of 1 still exists, we just covered this on the Advanced tab.
  21. This is what it looks like when we rename the admin user and change User ID 1.
  22. Your WordPress Dashboard is available 24 hours a day. This on e is really interesting.
  23. Let’s say you only have one or two people working on your site. Should people be logging in when you’re normally asleep?
  24. Away Mode lets you designate what time access to the backend automatically shuts down. Between these hours, the login screen is completely inaccessible, and you’ll be logged out when that away time starts.
  25. Your login area is partially protected from brute force attacks.
  26. Network brute force protection keeps track not only of the IP’s that try to break into your site, but also the IP’s that have tried to break into other sites in a network. By entering your email here, IP’s that have been identified as malicious by other sites will also be blocked from your site.
  27. You can also control lockouts locally, for IP’s that try to force your site open. These are settings for when those lockouts trigger, and how long to remember bad IP addresses. You can also automatically ban anyone that attempts to login with “admin” username. This is commonly used, because many older, unmaintained WordPress sites have admin for a username, usually accompanied by a weak password.
  28. You website is not looking for changed files.
  29. iThemes Security will observe if files get changed on your site, and send you an email alerting you to exactly what got changed.
  30. You can split file checking into chunks, or exclude certain files from being checked (though I would not enable this).
  31. Your WordPress Dashboard is using the default web address. This feature allows you to change the default logins URLs.
  32. Instead of default /wp-login.php or /wp-admin/ login screens, you can make the login URL whatever you want. Hackers send automated attacks to the default addresses, and when they don’t find those, that results in a 404, which we are protecting against. This is security by obscurity. Sophisticated hackers can still find your login URL, but this will eliminate many automated attacks. Don’t use wplogin or anything obvious for a URL. Use a secret phrase, word or random string of characters that is difficult to guess.
  33. You are not protecting common WordPress files from access.
  34. These settings protect people from browsing the wp-config file, .htaccess, wp-includes folder, and install.php files. You can also prevent people from browsing empty directories, filter out suspicious request methods in URLs, disallow non-English characters in the URL, and limit unusually long URLs. These can all be means people are trying to use to gain access to your site.
  35. The reduce comment spam option denies comments without a user agent. Browsers have user-agent headers. Search engine crawlers even have user-agent headers. Generally, only comment spam bots are missing a referrer or identifiable user-agent.
  36. Users can execute PHP from the uploads folder.
  37. This setting prevents people form uploading PHP files to execute in your uploads folder.
  38. Here’s the Low Priority Items. Enable Ban Users.
  39. You can ban IP addresses. You can also ban user-agents (certain crawler bots you want to restrict from your site).
  40. Changing Salts.
  41. Changing salts in the wp-config file logs everyone out, everywhere.
  42. Require secure connection = Forcing SSL / HTTPS for login.
  43. You can lock everyone out of the site. Get help with this one.
  44. Enforce Strong Passwords
  45. New WordPress installs now prompt admins for strong passwords. But what about Editors or other people with advanced roles and privileges? Someone can hack an Edotr account and still do damage to your site. With this, you can select which role level strong passwords are enforced at.
  46. Wp-Config and .htacces files are writeable by default. This is a vulnerability.
  47. This screenshot is at bottom of the Dashboard screen. You can see file permissions and what the recommendations are.
  48. Change permissions on these sensitive files here.
  49. Really Simple Discovery header is information used by certain services like Flickr, but it’s likely you don’t need it displaying in your source code.
  50. RSD header can give away information we don’t want bad guys to have,
  51. Disabling the file editor
  52. This means you won’t be able to edit theme or plugin files in the backend of the site. This also prevents someone from cracking your site and altering those files from the backend, if they hack into your site.
  53. Check to see if your theme is loading a safe version of jQuery.
  54. To test, click “Check your homepage”. This is important because if a theme bundles an old version of jQuery in the actual theme files, that theme can be hacked and that file can be malformed to become malicious. Same thing if you link to an unmaintained code repo for jQuery.
  55. Once your home page is checked, refresh the screen. You should see the okay message here.