Noupe Editorial Team February 17th, 2008

WordPress Security Tips and Hacks

We all agree that having a secure wordpress weblog should be our first priorities when keeping a successful blog. In this post we’d like you to share your knowledge and help us create the Wordpress Security guide to keep the bad guys out.

Below are 10 security tips that you can easily implement on your WordPress blog. Please share one or more life-savers you use permanently to help protect yourself from WordPress security issues.


1) Nobody should be allowed to search your entire server.


  • WPdesigner advices us to NOT use this search code in the search.php
    <?php echo $_SERVER ['PHP_SELF']; ?>

    Nobody should be allowed to search your entire server, or? Use this one instead:

    <?php bloginfo ('home'); ?>
  • Block WP- folders from being indexed by search engines, the best way to block them in your robots.txt file. Add the following line to your list:
    Disallow: /wp-* 

2) Directories should not be left open for public browsing

There is a potential problem letting people know what plugins you have, or what versions they are. If there is some known exploit that is linked to a plugin, it could be easy enough for someone to use it to their advantage. Make an empty wp-content/plugins/index.html file or just add this line in your .htaccess file in your root:

Options All -Indexes

3) Drop the version string in your Meta Tags

A large number of WordPress themes have the WordPress Meta Tag that show the version of WordPress that is running on your blog which is an easy way to get your blog prone to hackers if you didn't upgrade to the security-enhanced file permissions on both which is pointed out by Matt Cutts. Another solution involves a plugin that sets up a secondary new version.

This tag is in the header.php file that displays your current version of wordpress.

  1. <meta content="WordPress &lt;?php bloginfo('version'); ? /&gt;" name="generator" />

4) Protecting your Wordpress wp-admin folder

Attackers can use bots for a brute force style of attack that simply guesses the admin password until they come up with the correct one and login. There are a couple of solutions out there, we will highlight each below.

  • Limit access to wp-admin folder by IP address- This solution is to restrict which IP’s can access the wp-admin folder via .htaccess. This has one drawback is you may have to update your .htaccess folder if your internet provider assigns you a dynamic IP address, you move to another location or you have authors at other locations.
  • AskApache Password Protect- The plugin is simple, it adds a 2nd layer of security to your blog by requiring a username and password to access anything in the /wp-admin/ folder. All you have to do is choose a username and password and you are done. It writes the .htaccess file, without messing it up. It also encrypts your password and creates the .htpasswd file, as well as setting the correct security-enhanced file permissions on both.
  • Login Lockdown plugin- records the IP address and timestamp of every failed WordPress login attempt. If more than a certain number of attempts are detected within a short period of time from the same IP range, then the login function is disabled for all requests from that range. This helps to prevent brute force password discovery.

5) Stay up to date

You need to keep your on your plugin/widget, theme, and Wordpress versions updated. Also, subscribing to the plugin/widget/theme Author's RSS feeds makes keeping up with them much easier.


6) Take regular backups of your site and Database

You always have to take regular backups of your file directories as well as the database. WordPress Database Backup plugin creates backups of your core WordPress tables as well as other tables of your choice in the same database.


7) Update your wordpress to latest version

Probably the first thing you should do! Install the Instant Upgrade Plugin or the Wordpress Automatic Upgrade Plugin. Make sure you back everything up before performing the upgrades.


8 ) Use SSH/Shell Access instead of FTP

It is one of the best tips i found here.If someone gets a hold of your FTP login information (which is usually not encrypted and easy to get), they can manipulate your files and add spam to your site without you even knowing about it! Using SSH, everything is encrypted including the transfer of files, etc.


9)Stop worrying about your wp-config.php file

Keep your database username and password Safe by adding the following to the .htaccess file at the top level of your WordPress install:


<FilesMatch ^wp-config.php$>
deny from all
</FilesMatch>

This will make it harder for your database username and password to fall into the wrong hands in the event of a server problem.


Protect Your Blog With a Solid Password

Creating a strong password that is also memorable is one of the easiest defenses against being hacked. There are a lot of online password strength checker that you could check.

Also you might check lorelle's article on blogherald called Protect Your Blog With a Solid Password, offering tips and tricks to help create a strong password that is also memorable, and how to deal with all the myriad passwords we seem to accumulate online.

Noupe Editorial Team

The jungle is alive: Be it a collaboration between two or more authors or an article by an author not contributing regularly. In these cases you find the Noupe Editorial Team as the ones who made it. Guest authors get their own little bio boxes below the article, so watch out for these.

82 comments

  1. Hi.

    Thanks for the wonderful tips. One of my sites got hacked, so I was really worried and searching for how I could make blogs more secure and hence stumbled upon your site.

    Thanks!
    Mnis

  2. It should be added that a “disallow” in robots.txt does not provide any security at all. A malicious bot can simply choose to ignore it and your server will be helpless.

    Even people with the best of intentions can sting you by accident. There are programs which can act like bots, but adhere only to the rules for browsers. wget and curl are two examples.

    If somebody wants to download all your articles for off-line reading and uses such a downloader clumsily set to follow each and every internal link it finds at your site, you may just be in trouble.

    Both wget and curl will only stop if they encounter either a 404 (not found) or a 403 (forbidden). In that they behave like browsers who also don’t look at robots.txt.

    So – if any of your internal links lead into sensitive territory, make sure the target is password protected.

  3. Hi, Thanks for the great write-up:

    Regarding 9, if I put that code in .htaccess, it does not allow me to log in as well.

    Is that the correct command? Could you confirm?

    Also, to disable the directory browsing, you mentioned “Options All -Indexes” command. Would this disable the search engine crawling as well?

    Thanks again, JK

  4. Most of the people left their blog directory scannable in serahc engine and publicly browsable. This is big security hole for any blog…..

  5. As far as passwords are concerned, I highly recommend a password manager like KeePass Password Safe.

    It generates passwords and maintains them in a secure database. I don’t even try to make passwords memorable or reasonably short (most my passwords are now 25+ characters of completely random garbage).

    The auto-type function means just hitting a key-combination and having it find the proper password and using it.

    You, of course, now have to protect your password safe from loss. Not because it isn’t secure, but because you are depending on it. That’s fine by me.

    There are several of these types of programs. I chose KeePass because it also has a Linux version (KeePassX).

Leave a Reply

Your email address will not be published. Required fields are marked *