top of page

Incident Response

We reviewed Linux access logs through Cockpit, MariaDB logins, WordPress logins and attempts, as well as site traffic to identify our attacker. The only sign we saw of them was their accessing of our website and attempt to exploit it through the use of comments. Their attacks were unsuccessful.

Attempted attacks via WordPress comments

Identification of attacker's IP address via WPHide Login History

WordFence web-application firewall blocked 1590 attacks

IT4983 Capstone Project – Website Hardening

UIT07 - Sec W01 - D2L Group 1 Team 2

©2023 by it4983.capstone.fall2023. Proudly created with Wix.com

bottom of page