{"id":891,"date":"2012-02-26T14:37:48","date_gmt":"2012-02-26T20:37:48","guid":{"rendered":"http:\/\/jefftangen.com\/wordpress\/?p=891"},"modified":"2012-02-26T14:37:48","modified_gmt":"2012-02-26T20:37:48","slug":"surviving-wordpress-compromise-part-1","status":"publish","type":"post","link":"http:\/\/jefftangen.com\/wordpress\/?p=891","title":{"rendered":"Surviving WordPress Compromise (part 1)"},"content":{"rendered":"<p>So, your wordpress site has been hacked&#8230;<\/p>\n<p>Hidden php file that contains the malicious code. <\/p>\n<p>1. Make a backup of your site including the database.<br \/>\nIn your control panel there should be a backup application to make a backup of your entire site. Once the backup is complete, download the created file.<br \/>\nUse ftp to copy your entire site to your local computer.<br \/>\nUse phpmyadmin to make a dump (copy) of the database. <\/p>\n<p>It is better to have to many backups then not enough and lose your data. <\/p>\n<p>2. Make a screen shot of your plugins and themes (optional as you do have the names and files in the backups) <\/p>\n<p>3. Remove all plugins and themes and see if that gets rid of the malicious code. <\/p>\n<p>If that does not remove the malicious code then the site needs to be deleted and re-created. <\/p>\n<p>4. Remove wordpress from your installed applications in your control panel. This will delete permanently the wordpress site. <\/p>\n<p>5. Re-install wordpress in your control panel and make sure that wordpress is up to date. <\/p>\n<p>6. Edit the mysql database dump file and change the name of the database to be the newly created database name. <\/p>\n<p>7. Inside of phpmyadmin, remove all the tables that wordpress created. <\/p>\n<p>8. Import the database dump file. When it is imported, it will create all of the tables that were just deleted. <\/p>\n<p>9. Verify that the site comes up with the correct data and that the malicious code has been removed. <\/p>\n<p>10. Re-install any plug-ins and themes. <\/p>\n<p>11. Copy the uploaded files that was in the original site. Typically these files are under \/wordpress\/wp-content\/uploads <\/p>\n","protected":false},"excerpt":{"rendered":"<p>So, your wordpress site has been hacked&#8230; Hidden php file that contains the malicious code. 1. Make a backup of your site including the database. In your control panel there should be a backup application to make a backup of your entire site. Once the backup is complete, download the created file. Use ftp to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[29],"tags":[102],"_links":{"self":[{"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/891"}],"collection":[{"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=891"}],"version-history":[{"count":1,"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/891\/revisions"}],"predecessor-version":[{"id":892,"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/891\/revisions\/892"}],"wp:attachment":[{"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=891"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/jefftangen.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}