Announcement

Collapse
No announcement yet.

Brute-force prevention of the WordPress login page

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Brute-force prevention of the WordPress login page

    Clive is usually the one who posts these along with the other admins, but I figured since I saw it, I might as well since it hasn't been posted here yet.


    Brute-force prevention on the WordPress login page


    The web has seen an increased frequency of brute force attacks on WordPress sites recently, with malicious bots making hundreds of requests to the servers and generating a great amount of load on WordPress-based sites.
    To minimize the risk of unauthorized access to yours and your customers’ WordPress sites, our developers have added an extra level of security to the WordPress login page.
    As of today, our system will block for a period of 30 minutes each IP address that generates more than 15 login attempts within 3 minutes.
    This brute-force prevention functionality is now enabled by default for all WordPress-driven websites.
    It is conveniently integrated into the ModSecurity firewall interface, so you can easily manage it.
    Once an IP address has been blocked, you will see it highlighted in red in the Detected Attacks column on the ModSecurity information board:
    To see the log file for the blocked IP address, click on the ‘View’ link on the right:
    In the popup window, you will see a record of the blocked IP address, so you will know where the sequence of unauthorized login attempts originates from:
    If, for some reason, you want to disable the brute-force prevention functionality for your WordPress site, you can do so in two ways:
    - by putting the ModSecurity firewall in Detect mode; This means our system will still generate a log file for the detected login attempts, but the IP address will not be blocked:
    - by disabling ModSecurity completely:
    Hopefully, this newly added level of brute-force protection will help you maintain a more secure WordPress-based web presence.

    Source: http://blog.resellerspanel.com/lates...ogin-page.html

  • #2
    Nice one Nova!! I have been a bit busy recently and only check the blog every few days, if I remember.

    Interesting new feature. I hope it works and blocks all these attacks. Its a shame that this feature didn’t go further and blocked the IP address of persistent attackers across the entire RSP network. The problem is that these attackers have numerous IP's at their disposal and with 15 attempts per IP, this can still give your site a hammering. I have a security plugin that blocks via the .htaccess file for getting the login wrong 3 times and blocks for 24hours. Its amazing how many blocked IP's are logged. About 98% of all traffic to my WP sites are abusive (i.e. spammers, attackers etc)

    Comment


    • #3
      Wow, thats...a lot of spam traffic, lol.

      Comment


      • #4
        Good one nova!!! Should take quite a load off alot of servers!

        Comment


        • #5
          That was my though as well, and I figured it'd be best if everyone who doesn't actually peruse the blog on a regular basis should know, so, lol.

          Comment


          • #6
            Originally posted by doneritehosting View Post
            Should take quite a load off alot of servers!
            It definitely does!!!

            It is really REALLY frustrating the number of IPs/bots that are bruteforcing the servers.

            Best Regards,
            Tom.

            Comment

            Working...
            X