The more popular you are, the more vulnerable you become, and boy is WordPress popular. Just type in “WordPress” in Google and you get this… “About 1,840,000,000 results (0.75 seconds)”, that’s one-billion-eight-hundred-forty-million returns. On top of this, 90 percent of basic Hosting companies provide a quick and very convenient method to get WordPress installed and up and running in just an hour or so, and just 5 minutes with just a bit of experience. Here in lies the problem, the out of the box the WordPress install is open to attack by malicious server scans (AKA: Port Scanning), bad requests, and many other scary technical monsters hiding under the bed.
WordPress security just like its popularity is a very large subject, so are Firewalls. In a nutshell, a firewall is a network security method that controls incoming and outgoing network traffic based on a predetermined set of security rules. Sounds good until you start to implement it. To the uninitiated, it can be mind-boggling, and can quickly become 100 times more complex than SEO. There are many types of firewalls, software based, hardware based, and server based, for more info see the footnotes below. For the scope of this article, I am only going be referring to a server based method.
The 6G Firewall 2016 is a fantastic state-of-art firewall that deploys server directives via the htaccess file on your server host. The 6G Firewall 2016 is totally free and requires no plugin, note however if this is your first time diving into this level of WordPress security it can be a bit intimidating, But It has wonderful documentation to get you up to speed in no time. The 6G Firewall 2016 is under timely development and 6G Firewall 2017 is already in the works. There is no time like now to start hardening your WordPress site. I hope this article enlightens you on need.
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.
This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Disclosure of Material Connection: Some of the links in the post above are "affiliate links." This means if you click on the link and purchase the item, I will receive an affiliate commission. Regardless, I only recommend products or services I use personally and believe will add value to my readers. I am disclosing this in accordance with the Federal Trade Commission's 16 CFR, Part 255: "Guides Concerning the Use of Endorsements and Testimonials in Advertising."