Changes

Test my site for vulnerabilities

1,324 bytes added, 8 years ago
|Scenario Task Format=Solution
|Scenario Task Parent=My Website
|Scenario Task Type=Hacking, Unauthorised Access
|Scenario Task Description=The rule of thumb for not getting your site hacked or infected with malware is:
* Run up to date software, including all themes and plugins (if there are no recent updates to either - do not use them anymore)
* Do not install or run any services you are not currently using
* Make sure your webhost continually updates their own systems and services
 
Testing a site for vulnerabilities is not an easy task. You need to look not only at the various systems your website is comprised of and depends on, but to be able to interpret the results as well. A vulnerability could be found and exploited on a systems level (e.g. hosting set-up), in the web-server configuration, inside Wordpress or some third-party plug-in it is using.
 
An [https://pentest-tools.com online penetration test] is available with several testing options including a passive reconnaissance [https://pentest-tools.com/information-gathering/google-hacking# 'Google hacking'] test.
 
In principle it is recommended to run your own vulnerability testing systems, including the popular [https://nmap.org/download.html Nmap] tool and the suprisingly easy to set up but very well respected [http://www.tenable.com/products/nessus/nessus-professional Nessus vulnerability scanner].
}}
Bureaucrat, emailconfirmed, administrator, translator
662
edits