Triagis® Wordpress Security Evaluation – Check Folder Permissions, Fix For Common Security Vulnerab - Rating, Reviews, Demo & Download

Triagis® Wordpress Security Evaluation – Check Folder Permissions, Fix For Common Security Vulnerab Preview - Rating, Reviews, Demo & Download
5 Average out of 1 ratings
Free
Follow for free plugins, new theme releases and theme news

Plugin Description

Wordpress can be easily secured by following a few best security practices. We check your server and Wordpress installation for common security vulnerabilities, which you can then address right on the plugin page itself!

Some of the things we check for, which you can fix with a few clicks!

  • Check if thumthumb.php or other scripts exist that are easily exploited
  • Location of your wp-config.php
  • Is mod_security enabled
  • Is SSL for backend enabled
  • What information do you expose
  • Do you currently allow PHP to display errors?
  • What permission does your wp-config file, folders and other files on the server have – are they secure?
  • Is your server software up to date (MySQL,PHP,OS)
  • What database prefix do you use? (1-click Fix available)
  • What is the username of the admin account (1-click Fix available)

Don’t Expose Wordpress Version Using Our Suggestions

A default Wordpress installation will expose your version. Hackers scan sites for exploits and always look for older versions that are still vulnerable. Use our suggestion to remove it

Check Folder Permissions With 1-Click

Most Wordpress installations get hacked due to insecure folder permissions. World-writable (777) permissions invite other users to upload files to your server, making it highly vulnerable.

Move Wp-Content Directory

Most Wordpress installations use a folder called wp-content and a subdirectory “uploads”. If you want to make it a little more difficult for possible automated
attacks to succeed you might want to consider changing your wp-content directory name. With our plugin you can do that with a few clicks. NOTE: This is intended for development
environments and not production sites. We do not recommend to try this on your live sites.

Why TimThumb Poses A Security Threat

On all servers that host Wordpress sites you will have automated scans for a file called timthumb.php or a variation of other names that are targeting exactly this file. Why?
Because timthumb.php is very easy to exploit if you set the wrong file and folder permissions. If your server is mis-configured, timthumb.php poses a significant threat
to your site and server. That’s why we recommend that beginners try to locate plugins that make use of this script and try to find alternatives. An alternative approach is to move the timthumb.php outside
the public folders.

Future Versions

Planned for future versions is a dashboard widget with important information at a glance and additional security checks

Add improved way to check for TimThumb

Further Reading

For more info, check out the following articles and videos:

Screenshots

  1. triagis-security-evaluation screenshot 1

    Displays Urgent Warnings In Red / Yellow

  2. triagis-security-evaluation screenshot 2

    Various security options you can check and modify directly on the plugin page e.g. table prefix, admin account name, etc.


Reviews & Comments