Faced with pentest, many say that you need to delete these files in WordPress , but what's the vulnerability in them?
For reference, I do not delete the kernel files, with the functionality of the VP sign.
Faced with pentest, many say that you need to delete these files in WordPress , but what's the vulnerability in them?
For reference, I do not delete the kernel files, with the functionality of the VP sign.
Yes, there is no vulnerability in them. There are no known vulnerabilities in WordPress. And all these tips are from the monkey business series. If there is nothing to do, then you can think of a job - delete some files, hide the WordPress version (which is determined using 10 different methods). I don’t want to breed holivar here, but I don’t want to ignore a lot of bad advice either anywhere, but on Stack Overflow.
Check out the WordFence blog, the world's leading security expert for WordPress. They wrote about xml-rpc back in 2015 . And there people understand security issues better than you and me.
All these brute-force attacks are effectively closed by installing simple plug-ins blocking IP or the same WordFence.
Tips on protecting .php files from access seem more than strange - this is how, interestingly, you can read the contents of wp-config.php outside ???
Tips for removing unused files in WordPress are also definitely harmful. Because after the update you have to repeat this monkey work.
But updating the kernel and plugins is critical, because sometimes vulnerabilities are still discovered, and the WordPress team promptly releases security updates.
It is better to spend your time so that your code in WordPress does not depend on updates - i.e. was rendered into a child theme or plug-ins, did not use deprecated functions, was well documented and was easily modified.
many say that you need to delete these files
They say that chickens are milked ..
And by the name of upgrade.php really unclear what file is needed for updates? And install.php needed both for installing plugins and themes and for updates. And in general, it is found in many distribution files. It is worth thinking what will happen if he suddenly is not found.
Kernel files can not be touched, if there is no strong desire to break the site and spawn holes. None can be. If you need to change the functionality, it is done in other ways, rather than deleting files.
The files you specify from the installation process can be a potential backdoor.
The following files are recommended to delete:
readme.html - this file allows you to determine which version of WordPress you are using. The less information the attackers know about your site, the better. This applies to all readme* files, especially when your WordPress , including themes and plugins, is not updated regularly. The software version can be used to search for common vulnerabilities. The procedure for deleting the readme* files must be repeated after each update of WordPress , plugins, themes, etc.wp-admin/install.php - since the site is already installed, you no longer need this file. In general, the wp-admin/install.php and wp-admin/install-helper.php do not pose security risks after the installation process has been completed. Because wp-admin/install-helper.php will return a blank page, and wp-admin/install.php will inform you that the installation has already been completed and will offer to login./wp-admin/upgrade.php - theoretically could give the opportunity to update the site, and cause a "denial of service" using a direct request.
wp-config-sample.php is amazing, but many people leave this file filled with real data. It is also not needed after installation.
license.txt - in this file, of course, the exact version of WordPress is not indicated, but it is not difficult to guess from the text that the blog is made on WordPress . Also a clue for a cracker, especially if there are no obvious signs in your blog that you used this engine.xmlrpc.php - few people remember that, in combination, the default active XML-RPC protocol gives crackers an easy way to access a site using a brute force attack.The basic principle: if the file is no longer REQUIRED , it MUST NOT be there.
Files that recommend protecting:
wp-config.php is a holy grail for hackers that contains all sensitive information about your WordPress site, including passwords and databases.
wp-login.php is another file that is prone to brute-force attack, so you should limit the number of attempts to enter a login / password, and if there is no user registration on Wordpress , then you can restrict access to wp-login.php
Here is a good blog for further research on this issue.
Source: https://ru.stackoverflow.com/questions/698244/
All Articles
yoursite.com/install.phpand reinstall the engine, no? - Jagailo