WordPress Security Tips and Hacks
We all agree that having a secure wordpress weblog should be our first priorities when keeping a successful blog. In this post we’d like you to share your knowledge and help us create the Wordpress Security guide to keep the bad guys out.
Below are 10 security tips that you can easily implement on your WordPress blog. Please share one or more life-savers you use permanently to help protect yourself from WordPress security issues.
1) Nobody should be allowed to search your entire server.
- WPdesigner advices us to NOT use this search code in the search.php
<?php echo $_SERVER ['PHP_SELF']; ?>
Nobody should be allowed to search your entire server, or? Use this one instead:
<?php bloginfo ('home'); ?>
- Block WP- folders from being indexed by search engines, the best way to block them in your robots.txt file. Add the following line to your list:
Disallow: /wp-*
2) Directories should not be left open for public browsing
There is a potential problem letting people know what plugins you have, or what versions they are. If there is some known exploit that is linked to a plugin, it could be easy enough for someone to use it to their advantage. Make an empty wp-content/plugins/index.html file or just add this line in your .htaccess file in your root:
Options All -Indexes
3) Drop the version string in your Meta Tags
A large number of WordPress themes have the WordPress Meta Tag that show the version of WordPress that is running on your blog which is an easy way to get your blog prone to hackers if you didn't upgrade to the security-enhanced file permissions on both which is pointed out by Matt Cutts. Another solution involves a plugin that sets up a secondary new version.
This tag is in the header.php file that displays your current version of wordpress.
- <meta content="WordPress <?php bloginfo('version'); ? />" name="generator" />
4) Protecting your Wordpress wp-admin folder
Attackers can use bots for a brute force style of attack that simply guesses the admin password until they come up with the correct one and login. There are a couple of solutions out there, we will highlight each below.
- Limit access to wp-admin folder by IP address- This solution is to restrict which IP’s can access the wp-admin folder via .htaccess. This has one drawback is you may have to update your .htaccess folder if your internet provider assigns you a dynamic IP address, you move to another location or you have authors at other locations.
- AskApache Password Protect- The plugin is simple, it adds a 2nd layer of security to your blog by requiring a username and password to access anything in the /wp-admin/ folder. All you have to do is choose a username and password and you are done. It writes the .htaccess file, without messing it up. It also encrypts your password and creates the .htpasswd file, as well as setting the correct security-enhanced file permissions on both.
- Login Lockdown plugin- records the IP address and timestamp of every failed WordPress login attempt. If more than a certain number of attempts are detected within a short period of time from the same IP range, then the login function is disabled for all requests from that range. This helps to prevent brute force password discovery.
5) Stay up to date
You need to keep your on your plugin/widget, theme, and Wordpress versions updated. Also, subscribing to the plugin/widget/theme Author's RSS feeds makes keeping up with them much easier.
6) Take regular backups of your site and Database
You always have to take regular backups of your file directories as well as the database. WordPress Database Backup plugin creates backups of your core WordPress tables as well as other tables of your choice in the same database.
7) Update your wordpress to latest version
Probably the first thing you should do! Install the Instant Upgrade Plugin or the Wordpress Automatic Upgrade Plugin. Make sure you back everything up before performing the upgrades.
8 ) Use SSH/Shell Access instead of FTP
It is one of the best tips i found here.If someone gets a hold of your FTP login information (which is usually not encrypted and easy to get), they can manipulate your files and add spam to your site without you even knowing about it! Using SSH, everything is encrypted including the transfer of files, etc.
9)Stop worrying about your wp-config.php file
Keep your database username and password Safe by adding the following to the .htaccess file at the top level of your WordPress install:
<FilesMatch ^wp-config.php$>
deny from all
</FilesMatch>
This will make it harder for your database username and password to fall into the wrong hands in the event of a server problem.
Protect Your Blog With a Solid Password
Creating a strong password that is also memorable is one of the easiest defenses against being hacked. There are a lot of online password strength checker that you could check.
Also you might check lorelle's article on blogherald called Protect Your Blog With a Solid Password, offering tips and tricks to help create a strong password that is also memorable, and how to deal with all the myriad passwords we seem to accumulate online.
Nice tips but do u have any other tips related to abnormal use of HTTP_REFERER
This is a very important step for blogs, that I missed. I was infected with a trojan virus, and I didn’t see it ( i work on a mac) but when PC users visited my posts.. there were some serious problems, with a virus trying to infect their machines, so I have learned my lessson, fixed the problem said sorry to the my great visitors and now security is a must.
These tips have been vital to my blog.
Thank you
Chad
I would also add that a WP plugin developer should add something along the lines of:
[code]
if(preg_match(‘#’ . basename(__FILE__) . ‘#’, $_SERVER[‘PHP_SELF’])){
header($_SERVER[‘HTTP_HOST’]);
exit();
}
[/code]
to the top of there plugins to help with the security.
Great article, but shouldn’t item #9 be:
deny from all
?
The instruction as listed on the post generates an INternal Server Error every time.
*Sorry, forgot to wrap in code tags
Great article, but shouldn’t item #9 be:
deny from all
[code]
deny from all
[/code]
The instruction as listed on the post generates an Internal Server Error every time.
really nice list here. as for the ssh tip – bravo. it’s one of those really nice things that is super convenient as well as secure. soon, you find yourself using ssh for nearly every server admin task you can think of.
Hey nice tip…till now, like a stupid, i gave security a back-seat
the best tips i read, thanks for sharing
Thank you for the tips. I’ve been looking for something like this post for a while. You really made it simple and basic.
Thanks again,
Monica
Great tips. I recently let my blogs go without an update for 6 months. I came back to them to find numerous parts hacked. Adsense ads had different affiliate IDs, pharmacy and spam through posts and comments. Even folders full of spam files on the server. Basically every possible hack had been done to them.
WordPress is a high profile app and blackhats are always looking for the exploits then scanning the web for people who have unpatched blogs. Not safe.