Search Results for 'bots'
-
AuthorSearch Results
-
September 6, 2014 at 5:25 pm #190319
In reply to: Managing group creation
danbp
Participantmy 3 word recommendation: disallow group creation !
And prevent your users, if they need a group, that they have to ask you to create it for them.A good pratice to avoid spam, is to use another table prefix as the default wp_table_name. Bots really like this prefix to rape databases. πΏ
Aside you can also try to stop some spambots via htaccess.
Search on the web for more information on how you can do this.Here 2 lines you can add to htaccess to block some russian spambots (without any waranty)
RewriteCond %{HTTP_REFERER} ^(.*).ru/(.*) RewriteRule ^.*$ - [F]September 3, 2014 at 12:02 pm #189029In reply to: [Resolved] how to export/import groups
danbp
Participantif you use phpmyadmin, you can easily export the 3 tables related to groups from site 1 and import them in site 2. phpMyadmin has natively import/export tools and avoids you to use an extra plugin to generate CSV or sql formated files.
xxx_bp_groups
xxx_bp_groups_groupmeta
xxx_bp_groups_membersxxx is the prefix you entered during the wp install. By default it is wp, but it is recommended to use another one. Spambots are too much in love with wp_ prefix. You’re warned ! :d
May 25, 2014 at 7:58 pm #183332In reply to: Load more button stops working … sometimes
amckinnell
ParticipantHi Henry, here is the contents of that window:
Request URL: http://photoforte.com/wp-admin/admin-ajax.php
Request Method: POST
Status Code: HTTP/1.1 200 OK
Request Headers 12:51:58.000
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:29.0) Gecko/20100101 Firefox/29.0
Referer: http://photoforte.com/activity/
Pragma: no-cache
Host: photoforte.com
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 97
Connection: keep-alive
Cache-Control: no-cache
Accept-Language: en-gb,en;q=0.5
Accept-Encoding: gzip, deflate
Accept: application/json, text/javascript, */*; q=0.01
Sent Cookie
wp-settings-time-10: 1398959694
wp-settings-10: libraryContent=browse&editor=html&wplink=1&urlbutton=none&imgsize=full&align=center&hidetb=1
wordpress_test_cookie: WP+Cookie+check
wordpress_logged_in_0226a87af55d37f15c17099beebb5b87: amckinnell|1402256837|5ccb9ec3cbdec1dc82a94b7ed790dd41
wordpress_0226a87af55d37f15c17099beebb5b87: amckinnell|1402256837|5b043d1b070ce3f02b6457a112bdfd6a
s2member_tracking: fnIyOk5PVFdEQUJGSk9CeFBsZ2NMV3BiN2Rna3hMQUw0aTZzOmI3ZmEwNjU4NTQ2MGE0OWNiZDlmYTJhZGE2OTIyNDQzfEKGYUXbL9qRK4qkpq9Olm8qeZTiTkNtW3IJQea7fc4a
PHPSESSID: d3jd0dp456hmi7p57ib09rrku7
bp-activity-oldestpage: 1
__utmz: 82912087.1400555092.174.6.utmcsr=Photo FortΓΒ© Members|utmccn=7ce74da5f7-2014_May_Lesson_Week_3|utmcmd=email|utmctr=0_76b17b8542-7ce74da5f7-
__utmc: 82912087
__utmb: 82912087.7.9.1401047433231
__utma: 82912087.1423870743.1397575542.1400993272.1401047233.201
Response Headers Ξ1626ms
X-Robots-Tag: noindex
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
Transfer-Encoding: chunked
Server: Apache
Pragma: no-cache
Keep-Alive: timeout=5, max=85
Host-Header: 192fc2e7e50945beb8231a492d6a8024
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Date: Sun, 25 May 2014 19:51:50 GMT
Content-Type: text/html; charset=UTF-8
Connection: Keep-Alive
Cache-Control: no-cache, must-revalidate, max-age=0About your other questions, it is a total custom theme, but I haven’t made any changes to it for weeks and this problem just cropped up a couple of days ago. I know for sure it just started because I use that load more all day.
It’s difficult for me to answer the question about whether it happens in the default theme because I don’t want to change my live site because people are using it, and when I create a staging site, the load more button works in the current theme. I cannot understand why the problem only exists on the live site and not the staging site. I am creating the staging site when I am seeing the issue, it only takes a couple of minutes to create it, it’s on the same server, but the load more button works there.
Thanks again for your help.
May 21, 2014 at 5:06 pm #183207guoyunhebrave
ParticipantI finally solved it!
This is caused by another plugin named “DW Question & Answer“. It has a quick register form that can be used to avoid CAPTCHA methods.
I disabled this plugin and robots should be stopped.
May 21, 2014 at 2:33 pm #183202guoyunhebrave
ParticipantAfter disabled BuddyPress, robots didn’t stop. I am almost sure the robot can skip the register page (both WordPress signup.php and BuddyPress register page).
Maybe robots have a backdoor to register on WordPress. I don’t know how to further test.
May 21, 2014 at 1:59 pm #183198guoyunhebrave
ParticipantI installed this plugin today. I keep receiving robots registering until now.
I think the robots have passed by WangGuard and any other CAPTCHA plugins, because all of them have no effect.
Before I use BuddyPress on this site, I didn’t meet these problem. A simple CAPTCHA plugin works well. I will try to disable BuddyPress for hours, and see what will happen.
May 21, 2014 at 1:51 pm #183197guoyunhebrave
ParticipantSomething I test with WangGuard:
I set some WangGuard questions. Once these questions are answered, I could see wrong/right statistics in configuration page. But after robots registered, no information update.
So maybe the robots can avoid register on the sign up page. That is beyond my knowledge.
May 21, 2014 at 1:48 pm #183196Jose Conti
ParticipantThe security question works, so bots cannot register in the website.
How long are WangGuard active in your website?
If are active less than 2 days, maybe are signups made before WangGuard was installed.
All users has 48h for activate their accounts, so maybe bots are blocked. Wait 2 days and update the result here.
May 9, 2014 at 7:08 am #182692In reply to: New user registrations ..from my own server??
Shea Bunge
ParticipantI’m the developer of BuddyPress Security Check. Unfortunately, it appears that spammers have found a way to complete the math sum, allowing them to register. This means that BuddyPress Security Check will probably not prevent bots from registering. It certainly isn’t generating fake signups though. Probably best to disable BuddyPress Security Check until I figure out how I can fix it and release a new update.
Thanks for the ping @johnjamesjaccoby
March 13, 2014 at 10:29 pm #179739In reply to: Can't stop spam registrations
Henry Wright
Moderator@robg48 something else you could do is use a honeypot. An example is
http://www.pixeljar.net/2012/09/19/eliminate-buddypress-spam-registrations/
It works by adding a hidden field to your registration form. Users can’t see the field so will never complete it (it will always be blank). Spam bots, however, don’t view the page in the same way as users. They ‘see’ the page source so will always ‘see’ the hidden field and try to complete it.
On registration form submission, if the hidden field is blank then we know it’s a genuine user trying to sign up. If the field is completed then we know it’s a spam bot and we can halt the registration. Hence, the name honeypot.
March 13, 2014 at 8:28 pm #179729In reply to: Can't stop spam registrations
Henry Wright
Moderator@robg48 just a thought – try changing the name of your registration page. Spam bots automatically look for pages such as /register/ so maybe use /sign-me-up/
March 7, 2014 at 6:41 pm #179434In reply to: Stop BuddyPress SPAM
contrasupport
ParticipantMost of wordpress plugins mentions above work like
Attacker > HTTP server > PHP > WordPress > PLUGINS
We all need to have something before WordPress that’s why I recommend
NinjaFirewall (I do not have any relation with the plugin creator)
https://wordpress.org/plugins/ninjafirewall/
Block the attacker before the WordPress
Attacker > HTTP server > PHP > NinjaFirewall > WordPress > PLUGINS
As always in installing any plugins that possibly can block your admin access you have to read the Installation note and have access to the FTP.
NinjaFirewall will work as another layer to protect your site.
In addition if you have not done it:
- Change your “Admin” username to something dificult and at least 10 characters (+) but easily to remember (+ for you – for security) or you have to read a note (-) safely secured in your safe locker (+)
- Make your password at least 25 COMBINATION of characters (+) but easily to remember (+ for you – for security) or you have to read a note (-) safely secured in your safe locker (+)
NinjaFirewall:
- Web Application Firewall
- Full standalone web application firewall
- Multi-site support
- Compatible with shared hosting accounts
- Protects against RFI, LFI, XSS, code execution, SQL injections, brute
- force scanners, shell scripts, backdoors and many other threats
- Scans and/or sanitises GET / POST requests, HTTP / HTTPS traffic, cookies, server variables (HTTP_USER_AGENT, HTTP_REFERER, PHP_SELF, PATH_TRANSLATED, PATH_INFO)
- Sanitises variables names and values
- Advanced filtering options (ASCII control characters, NULL byte, PHP built
- in wrappers, base64 decoder)
- Blocks username enumeration scanning attempts through the author archives and the login page
- Blocks/allows uploads, sanitises uploaded file names
- Blocks suspicious bots and scanners
- Hides PHP error and notice messages
- Blocks direct access to PHP scripts located inside specific directories
- Whitelist option for WordPress administrator(s), localhost and private IP address spaces
- Configurable HTTP return code and message
- Rules editor to enable/disable built-in security rules
- Activity log and statistics
- Debugging mode
March 6, 2014 at 9:48 pm #179402In reply to: Stop BuddyPress SPAM
BuddyBoss
ParticipantTwo more methods that help. I recently had a crazy spam attack – probably 300 fake signups per day. I implemented these two methods and it dropped to near 0.
1. Change the /register/ slug to something unique. An example would be /create-your-account/, or something of that nature. It just needs to be unique and also make sense in a URL for your user. Spammers targeting BuddyPress look for /register/ as the signup page. It’s all automated so you want to filter them out at the first step.
2. Add this to your functions.php file in your theme or child theme.
It presents a dummy field that humans don’t see. Spambots will fill it out, and if the field captures a value it will reject the signup.
// BuddyPress Honeypot function add_honeypot() { echo ''; } add_action('bp_after_signup_profile_fields','add_honeypot'); function check_honeypot() { if (!empty($_POST['system55'])) { global $bp; wp_redirect(home_url()); exit; } } add_filter('bp_core_validate_user_signup','check_honeypot');Credits for #2 go to:
http://mattts.net/development-stuff/web-development-stuff/wordpress/buddypress/anti-spam-techniques/registration-honeypot/I edited it slightly to remove the required redirect. Add that back from his tutorial if you want to. It requires that you make an extra page to send the spammer to, and I personally think that’s not necessary. I actually want them to have no indication their signup failed.
March 1, 2014 at 11:52 pm #179137In reply to: Stop BuddyPress SPAM
contrasupport
Participant5-10 is OK — When I was handling a job application site every month we received 4000-5000 applicants and and had about 75-200 “bad users” we did have people entering bad email for their job application but it was also sometime the applicant mistype their email AND ending up shooting registration confirmation to the wrong/closed/nonexistent email at Gmail/Yahoo/Hotmail etc (I had to deal with those email providers 1-2 times a year to make sure that my Mail Server is not on the blacklist).
Btw on the Stop Spammers setting add the StopSpamForum API that way it easier for you to check or submit bad user (add Honeypot & Botscout if possible). Also “Check Spam Words” on the setting and add to them if you see a bad username keep popping up with different IPs.
January 8, 2014 at 7:39 pm #176615In reply to: Best Captcha & Spam Protection for BUDDYPRESS?
Henry Wright
ModeratorAlso, rename your ‘register’ page to something else. Lots of spam bots look for
/register/so something as simple as/register-page/will help hide your sign up form from at least a few of the bots.October 15, 2013 at 8:57 pm #172894In reply to: [Resolved] WordPress comments in Activity
danbp
Participanthi @trinzia,
don’t ask here about YOUR security settings ! We are not reading in chicken guts or in cristal bowls. π
Also, if you use BP 1.8+, a solution given over a year back cannot work (most of time)
See here an old discussion with a recent answer (2 mounth) – has patch.
But before to do something, check your WP settings if comments are allowed and/or if comments are allowed for your test post (sorry for this, but… nobody’s perfect ! π )
Also, if you cheched site indexing by robots (settings > reading) it may be possible that the comments won’t show up on the activity wall.
Encountered this a few mounth back with bbPress forum answers on a bp 1.7/bbp 2.3 installJune 24, 2013 at 5:11 pm #166763In reply to: Untraceable spam user
mareksgregs
Participant@ubernaut I tried that Wangguard plugin (thanks for introducing it to me by the way, it’s awesome) and when I scanned the user, it’s status came back as “Error – 101”
I don’t see how my site could be hacked though. Perhaps the problem is in one of my plugins. Unlikely though. All of my active plugins are legit and shouldn’t have spam bots in their files…
June 20, 2013 at 2:27 am #166446In reply to: Buddypress Spam BOTS PLEASE HELP
inge12
ParticipantLeofitz, WangGuard will check your user base for spammers and delete them.
See https://wordpress.org/plugins/wangguard/
The author says that “WangGuard not only protect your site from sploggers, spam users or unwanted users, WangGuard cleans your database from them. No plugin or service does this, only with WangGuard you will get this feature,” and I believe him. His English may not be too good, but the plugin is really outstanding.
There’s just one consideration for you: In order to have your database cleaned up, you will have to submit far more than 500 queries the first month. Perhaps you can arrange to pay for a month?
Here’s my suggestion to reduce database queries after that. (It worked for me.) Buddypress allows for the customization of User Profiles. Add a couple of questions that require a certain amount of intelligence to answer and make them required. That means the form will not be submitted either to WordPress or to WangGuard if the required fields are not filled out. It’s not fool-proof, but it decreased queries on my very busy site to just a few a day.
Incidentally, I added a question, “How do you plan to participate?” Among the choices offered the user are these:
“I want to increase my online presence.” and
“I want to sell my stuff.”We don’t need anyone not bright enough to figure out that these replies do not make the user desirable. Now all I need is a script to automatically kick out users who choose these replies. π (As it is, they can be manually deleted if other users report them.)
I don’t know what happens to a group when all the users are unsubscribed, so this may not be precisely what you are looking for. But WangGuard will make your site secure against almost all sploggers. (One registrant passed all tests on our site, and we had to delete manually, but that person must have registered manually too.)
Good luck!
Inge (http://ssnet.org)
June 19, 2013 at 4:38 pm #166405In reply to: Buddypress Spam BOTS PLEASE HELP
Ben Hansen
Participantmaybe not as long as you think if you use the backend, can’t you mass delete them that way?
June 19, 2013 at 7:34 am #166380In reply to: Buddypress Spam BOTS PLEASE HELP
Leofitz
ParticipantAre there any current plugin solutions which can delete accumulated BP spam groups? The BP Group Management plugin did this, from what I’ve read, but it gives error messages with the current versions WP 3.5.1 and BP 1.7.2
Any suggestions will be appreciated as I have a couple dozen WP-BP sites and some have 1000-5000 groups that are spam generated. Manually deleting these would take me until 2014!
June 14, 2013 at 8:22 pm #166077rcain
Participantps. we also use (dreaded) captcha fields (plugin) on forms, but have noted of late there are bots out there (eg: XRummer, et al) scraping such captcha images off the web in order to seed simple AI scripts to bypass such protection. pretty clever stuff & born out by what we see in our logs.
June 14, 2013 at 8:09 pm #166075rcain
Participant@bp-help
good suggestions. thx. 2 of them r new to me, so other people may find them helpful also.
on our sites we r using::
Keith Graham’s most excellent ‘stop-spammer-registrations-plugin’ – https://wordpress.org/plugins/stop-spammer-registrations-plugin/
– has stopped over 53,000 spammers since feb this year! it uses external lookups on StopForumSpam, ProjectHoneyPot, BotScout, (Akismet, which we dont use), others – thus great collective benefit/advance warning of bad traffic. also traps brute force attacks (bad logins/registrations/comment posts, etc), etc. is simple enough to play nice with most plugins.
to try & keep as much load off the front-end of the server as possible, we also have set up:
linux iptables ( & ufw add on )- as the basis of all firewall stuff. also has our manually maintained blacklists & whitelists. various custom rule chains setup. takes a while to get your head around, but is essential.
linux fail2ban – essentially an add on to iptables, puts people in jail for bad behaviour – eg: brute force attacks against ssh, ftp, mail logins. we also have set up custom rules detecting bad activity against wp-login.php itself via fail2ban. am looking to do some more with this.
linux apache – mod-security2, libapache2-mod-evasive, libapache2-mod-antiloris, libapache2mod-spamhaus – which help protect against general bad behaviour, DDOS, blank header attacks, the infamous ‘Loris’ script (which we’ve experienced!), and bot-nets. still assessing how effective these r.
we have also had to tune apache on our VPS for resilience in the face of DDOS type attacks and heavy-handed brute force attacks.
some further good tips here: http://www.dannytsang.co.uk/index.php/apache-2-hardening-tips/ & elsewhere.
linux logwatch – reports various access stats (the good & the bad & the ugly) via email – very useful indeed for checking whther situation is under control (or not).
linux rkhunter – scans for rootkits on the server from time to time – just be sure – & particularly useful if u ever do get infected in hunting down the intruder’s code.
obviously we also have file system bolted down. (there is a good wp plugin to check permissions bolt-down, i forget what its called). we also spend a LONG time analysing logs etc.
anway, that takes care of many of the bad boys, but we r still left with the following problems to crack:
1) we have observed that many bad bots/scripts are exhibiting ‘learning behaviour’ (ie. heuristic) and r finding ways around fail2ban rules/jails, etc. in particular:
a) rotating IP addresses to match ‘ban counts’ – currently we have them wasting an IP address every 3-4 attempts, but they still seem to have an inexhaustable supply, else are spoofing extreamly well.
b) varying their retry period to match the length of jail sentence. (ie. they are not wasting their mips whilst in jail, just enough to detect when they are released,record it, and tune their future responses).
2) content scrapers, probes and bad-bots generally – these r wasting enormous resource on our servers. typically i would suggest such ‘bad traffic’ is responsible for over 50% of total server load (ie. not good at peak times on a busy site). additional problems we r facing here:
a) bad bots often spoof the agent string to pretend to be eg. google, bing, etc. the only way u can tell is by reverse lookup of ip address and try and match to one of well known range of ‘good bot’ addresses. but, despite fact that many ranges are well known, most of them are never actually published or confirmed, many are variable. i am not aware of any definitve list of ip addresses of good bots (though there is http://www.iplists.com/ whichis not bad, & http://www.webmasterworld.com/search_engine_spiders/ which is often helpful – these are very much ‘best efforts/as seen in the wild’ lists.). this problem worsens with the rise of social network agregation services, other (legitimate) content agregators, and personal content aggregating software on mobiles, tablets, etc.
idea: i am thinking of writing a script/plugin/rule to do smart lookup of ip against good bots list, & to automatically maintain that (collective) list. ideally, this is a service that someone like spamhause, or projecthoneypot should offer, since they already have the infrastructure. but, we’ll see. the script will detect traffic ‘purporting to be a SE bot, of any kind and to ban it via iptables if it isnt in the approved list/doesnt check out. the risk is in false positives and harming ones SEO. anyone any thought in this area?
b) probes & sniffers hunting out wp/bp forms, ajax ports, plugin files, forms, etc – in advance of main attack by penatration/spamming bots. typically always use swiftly rotated ip’s. many many variants out there. usually they have no luck on our sites, but that does not stop them trying in vast numbers (bot-nets, collectives? hives?) and harming out response times, etc.
idea: url obfuscation has been brought up on this forum before, particularly for eg: login, registration, admin url’s, etc. i am thinking of creating a plugin to dynamically hash encode links of choice using someething based on wp forms nonce system. not only useful for causing probes & hackers pain, but also to help thwart media thieves. obviously, scripters will soon respond by just snanning for link titles in html, so not bullet proof in any way, but they will at least be on 1-time request code, so causing them page reload every request & less sophisticted scripts will be totally wasting their own time.
anyway. these have been my thought so far. would love to hear experience/insights of others.
unfortuntely wordpress & buddypress sites in particular represent the richest of prizes for hackers, content scrapers, spammers, etc – & they r really on our case. furthermore, there is some BIG money involved, from porn to pharma to credit card fraud; that means some very smart programmers being paid excellent rates, to hack our systems, full time. add to that, the 10’s of millions of infected machines out there (often unknowingly) operating as botnet drones, trying to pernetrate our servers 24×7, steal our machine resources and steal our members personal data. it is a war of attrition.
all further experience, ideas welcome, here.
June 8, 2013 at 3:08 pm #165591bp-help
Participant@dice2dice
You can change the register page name and slug to sign-up.
You can also try using Private Community For BP:
You will also need to change line 27 in private-community-for-bp.php from /register to /sign-up to reflect the change of the register slug.
If your not using it you can get it here:
https://github.com/bphelp/private_community_for_bp
Another thing you can try is this small plugin “Spam Killer” which creates a hidden field humans can’t see, spam-bots will see it and fill it out and get a message indicating spammy behavior and it rejects their registration. Get it here:
https://github.com/bphelp/bp-spam-killer
Please read the readme.txt for complete instructions for usage for both plugins.June 6, 2013 at 4:19 am #165438In reply to: Members count missing 1/5 of the actual number?
bp-help
Participant@tux-kapono
Why would it be confusing unless you have several admins? Subscribers should not have access to how many registered users there are in the dashboard anyway. Unless those users are active participants wouldn’t it kinda mislead new legitimate registered users that there is more active members than what is truly there? Most likely the registered users that never logged in was either spam-bots or human spammers and most people fight that tooth and nail. If you have several admins then I would just communicate that to them.June 3, 2013 at 7:04 am #165279In reply to: Buddypress Spam BOTS PLEASE HELP
bp-help
Participant@wpbp
I produced a small plugin that is geared toward automated spam attacks but I haven’t gotten any feedback as far as its effectiveness:
https://github.com/bphelp/bp-spam-killer
As far as spam attacks from real users I think there are helpful solutions out there but spammer hacker types will always find way to circumvent any prevention method so the best prevention as an admin is being active on your site. -
AuthorSearch Results