Why going after wp-config is a quick way to get banned

By |2019-08-15T13:19:42-04:00January 15th, 2016|Categories: Attribution, Defensive Methodology, Hacking, Reports, Wordpress|

Internet sites with Wordpress are normally exploited with ease in two ways: 1. Vulnerable plugins or a vulnerability in Wordpress. 2. Reading backup's of the wp-config.php file. The first is actually more common place. The second assumes the admin that maintains Wordpress leaves a backup or older version of the file readable by any visitor that [...]