Added #22 thanks to @SourceFrenchy
@@ -82,4 +82,8 @@ Attackers may use search engines to find potential vulnerable victims. By removi
|
|||||||
|
|
||||||
WordPress in recent versions uses the 'X-Frame-Options' HTTP header for privileged users to tell the browser where HTML frames are allowed to be loaded from. This isn't however set for unauthenticated users, allowing for potential [ClickJacking](https://www.owasp.org/index.php/Clickjacking) attacks.
|
WordPress in recent versions uses the 'X-Frame-Options' HTTP header for privileged users to tell the browser where HTML frames are allowed to be loaded from. This isn't however set for unauthenticated users, allowing for potential [ClickJacking](https://www.owasp.org/index.php/Clickjacking) attacks.
|
||||||
|
|
||||||
|
**22. IP whitelist the wp-login.php file.**
|
||||||
|
|
||||||
|
Most administrative users login to their blog via the same IP address. By whitelisting access to the wp-login.php file you ensure that only specific IPs can access the wp-login.php file.
|
||||||
|
|
||||||
**For further WordPress hardening tips see: [http://codex.wordpress.org/Hardening_WordPress](http://codex.wordpress.org/Hardening_WordPress)**
|
**For further WordPress hardening tips see: [http://codex.wordpress.org/Hardening_WordPress](http://codex.wordpress.org/Hardening_WordPress)**
|
||||||
Reference in New Issue
Block a user