Actions

Difference between revisions of "Security Checklist/Site Recovery"

From Joomla! Documentation

< Security Checklist
(Reset your administrator password)
Line 2: Line 2:
  
 
== Site Recovery ==
 
== Site Recovery ==
 +
 +
=== Get help the right way ===
 +
:If you believe your Web site was attacked, '''do not''' post in the Joomla! forums. If there is a vulnerability, publishing that information could put other Web sites at risk. Instead, report possible security vulnerabilities to the [http://developer.joomla.org/security/contact-the-team.html Joomla! Security Task Force].
  
 
=== Follow a logical and rigorous recovery process ===
 
=== Follow a logical and rigorous recovery process ===
Line 11: Line 14:
 
===Find exploit attempts using the *NIX shell===
 
===Find exploit attempts using the *NIX shell===
 
:Know how to check for suspicious and/or modified files. Know how to check the raw Apache logs for suspicious activity on your site. '''([[Security_and_Performance_FAQs#How_do_I_find_exploits_using_the_.2ANIX_shell.3F|FAQ]])'''
 
:Know how to check for suspicious and/or modified files. Know how to check the raw Apache logs for suspicious activity on your site. '''([[Security_and_Performance_FAQs#How_do_I_find_exploits_using_the_.2ANIX_shell.3F|FAQ]])'''
 
=== Get help the right way ===
 
:If you believe your Web site was attacked, '''do not''' post in the Joomla! forums. If there is a vulnerability, publishing that information could put other Web sites at risk. Instead, report possible security vulnerabilities to the [http://developer.joomla.org/security/contact-the-team.html Joomla! Security Task Force].
 
  
 
== Your Turn... ==
 
== Your Turn... ==

Revision as of 01:14, 29 October 2008

Contents

Site Recovery

Get help the right way

If you believe your Web site was attacked, do not post in the Joomla! forums. If there is a vulnerability, publishing that information could put other Web sites at risk. Instead, report possible security vulnerabilities to the Joomla! Security Task Force.

Follow a logical and rigorous recovery process

Know the important steps to follow when your site has been compromised. Once you've gotten to this point, there are few shortcuts. (FAQ)

Reset your administrator password

Many attackers take pleasure in locking you out of your site. They do this by 'changing the key', or changing your administrator password. If you are locked out, don't panic! There is a simple procedure for resetting your administrator password. (FAQ)

Find exploit attempts using the *NIX shell

Know how to check for suspicious and/or modified files. Know how to check the raw Apache logs for suspicious activity on your site. (FAQ)

Your Turn...

If you discover a bug in Joomla! core files, report it here.

Choose A Checklist

  1. Getting Started
  2. Hosting and Server Setup
  3. Testing and Development
  4. Joomla Setup
  5. Site Administration
  6. Site Recovery