This topic contains 8 replies, has 2 voices. Last updated by Bruce 3 years, 9 months ago.
Topic Author | Topic |
---|---|
Posted: Tuesday Apr 9th, 2013 at 1:00 pm #46918 | |
Hey there, there was a brute force attempt on my site this morning, which shouldn’t have been possible with the S2member brute force settings in place. The hosting company took the account offline and the hacker didn’t get in, but I’m still looking into why it was even possible to attempt it that way when they should have had a 30 minute punishment after the 5th attempt. As a temporary, and perhaps permanent addition, to my site security I’ve added a captcha math question to the login form so if trying to login you would have to answer math questions with each attempt. However, I’m wondering if the S2member pro login widget is perhaps leaving a small window of opportunity with this type of attack. I’ve tried logging in with the incorrect user name and password and I’m automatically redirected to the login form and the captcha question. However, there isn’t a way to implement that on the login widget itself. So, you get at least one attempt without regard to the captcha question through the widget. That might be something they can exploit if their script is capable of opening windows and seeking out the login widget as a means of gaining access to the site. I’m wondering if that has anything to do with why S2member didn’t auto punish the attacker after his 5th attempt? Could attacking through the widget somehow bypass the brute force settings? It was an attack on the wp-admin part of the site. I’d be happy to set up an account for somebody to poke around the S2member settings if that would help. Rich |