Hi Support,
Today I reviewed the website search-form results, (I’m using the Relevanssi plugin), and found a great deal (000’s in past months) of search entries like this. I wasn’t able to find any suggestions online how to prevent these bot-attacks (I think they are automated bots!). Could you offer any advice about how best to protect the search form.
.net1111111111111″ UNION SELECT CHAR(45,120,49,45,81,45),CHAR(45,120,50,45,81,45),CHAR(45,120,51,45,81,45),CHAR(45,120,52,45,81,45),CHAR(45,120,53,45,81,45),CHAR(45,120,54,45,81,45) — /* order by “as
.net” or (1,2)=(select*from(select
name_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a) — “x”=”x
.net99999″ union select unhex(hex(version())) — “x”=”x
php’ or (1,2)=(select*from(select name_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a) — ‘x’=’x
php browser99999′ union select unhex(hex(version())) — ‘x’=’x
Many thanks in advance,
Paul
Hey Paul,
Sorry for the late reply, I would recommend using a plugin such as Blackhole for Bad Bots and BBQ: Block Bad Queries since this looks like the type of attack you are getting. These two plugins are from the same author, Jeff Starr, so they will work together and should work with Enfold.
If you still have attacks Banhammer is also good but requires some hands-on moderating from you.
Best regards,
Mike
Many thanks Mike, I’ll give those suggestion a try.