* Posts by doc

1 post • joined 7 Nov 2008

Fake site punts Trojanised WordPress

doc
Thumb Up

Bots and Hacks Still expoitable

More on Wordpress 2.6.2 and 2.6.3 exploits.

Malicious damage can be caused by exploits from JadenAveBot used by PSI; hosted by Cogentco. The trick is writing exclusions in the robot.txt

****User-agent: Bad bot

Disallow: / cgi-bin /

Disallow: / images /

Disallow: / tmp /

Disallow: / private /

Disallow: /wp-content /

Disallow: /wp-admin /

User-agent: Snapbot

Disallow: / cgi-bin /

Disallow: / images /

Disallow: / tmp /

Disallow: / private /

Disallow: /wp-content /

Disallow: /wp-admin /

User-agent: ShopWiki

Disallow: / cgi-bin /

Disallow: / images /

Disallow: / tmp /

Disallow: / private /

Disallow: /wp-content /

Disallow: /wp-admin /

User-agent: Voyager

Disallow: / cgi-bin /

Disallow: / images /

Disallow: / tmp /

Disallow: / private /

Disallow: /wp-content /

Disallow: /wp-admin /

User-agent:JadynAveBot

Disallow: / cgi-bin /

Disallow: / images /

Disallow: / tmp /

Disallow: / private /

Disallow: /wp-content /

Disallow: /wp-admin /****

another trick is to excluded websites using PHP Script and htaccess files to work together to ban sites and user defined ranges to limit access to wordpress sites.

0
0

Forums