How to avoid WordPress Hack!

Over 100,000 word press sites have been compromised recently. The attacker used the XML RPC vulnerability to take control of the word press websites and than use these sites to launch DDoS attack over the other legitimate sites. The attack was first discovered by the Security Scanning website called SECURI as they were trying to track the source of a DD0S attack.
The attack can be avoided by disabling the XML RPC service using the word press admin panel. Following is the step by step instruction on how that can be achieved.

1. Just go to the wordpress admin panel

login
2. Click on the Settings->writing option

settings
3. unchecked the option give in the screenshot

settings_writing1
4.remove the link “http://rpc.pingomatic.com/”settings_writing

5. save the settings

This will most certainly remove the possibility of exploiting the XML RPC service to use this site for attack.

Manu Mayank

Manu Mayank is director of Abacus Desk and a Redditor. He love to read about technology and sincerely feel that world is a better place thanks to the Internet. He is a strong supporter of Open Source and believe in knowledge sharing.This blog is just my contribution to the world wide web. Besides he also love to Cook and eat !!!

Related Posts
Leave a reply
Captcha Click on image to update the captcha .