HEX
Server: Apache
System: Linux ubuntu-s-2vcpu-4gb-amd-sfo3-01-KIT-DIGITAL 6.5.0-44-generic #44-Ubuntu SMP PREEMPT_DYNAMIC Fri Jun 7 15:10:09 UTC 2024 x86_64
User: www-data (33)
PHP: 8.2.10-2ubuntu2.2
Disabled: NONE
Upload Files
File: /var/www/html/usefullCommands.sh
#!/bin/bash
SITE="/var/www/html/mobil8"

chattr -R -i "$SITE" 2>/dev/null
chown -R www-data:www-data "$SITE"
find "$SITE" -type d -exec chmod 755 {} \;
find "$SITE" -type f -exec chmod 644 {} \;

if [ -f "$SITE/wp-config.php" ]; then
    if ! grep -q "FS_METHOD" "$SITE/wp-config.php"; then
        sed -i "/wp-settings.php/i define('FS_METHOD', 'direct');" "$SITE/wp-config.php"
    fi
fi

systemctl restart apache2 2>/dev/null
systemctl restart php*-fpm 2>/dev/null


#!/bin/bash
SITE="/var/www/html/mobil8"
BAD_PLUGINS_REGEX="asazysac|javax-|u-short|urshort"

chattr -i "$SITE/index.php" "$SITE/.htaccess" "$SITE/wp-config.php" 2>/dev/null
chattr -i "$SITE/wp-content/uploads/.htaccess" 2>/dev/null

find "$SITE/wp-content/plugins" -maxdepth 1 -regextype posix-extended -regex ".*($BAD_PLUGINS_REGEX).*" -exec rm -rf {} + 2>/dev/null

chown -R mobil8:mobil8 "$SITE"
find "$SITE" -type d -exec chmod 755 {} \;
find "$SITE" -type f -exec chmod 644 {} \;

mkdir -p "$SITE/wp-content/uploads"
chgrp -R www-data "$SITE/wp-content/uploads"
chmod -R 775 "$SITE/wp-content/uploads"

echo -e "<Files *.php>\n    deny from all\n</Files>" > "$SITE/wp-content/uploads/.htaccess"
chown mobil8:www-data "$SITE/wp-content/uploads/.htaccess"
chmod 644 "$SITE/wp-content/uploads/.htaccess"
chattr +i "$SITE/wp-content/uploads/.htaccess"

echo '<?php define("WP_USE_THEMES", true); require __DIR__ . "/wp-blog-header.php";' > "$SITE/index.php"
chattr +i "$SITE/index.php" "$SITE/.htaccess"

echo "Proceso de cierre completado para $SITE"



wp theme install hello-elementor --activate --allow-root --path="/var/www/html/mobil8"



SITE="/var/www/html/edouarddupressoir"
BAD_PLUGINS_REGEX="asazysac|javax-|u-short|urshort"

chattr -i "$SITE/index.php" "$SITE/.htaccess" "$SITE/wp-config.php" 2>/dev/null
chattr -i "$SITE/wp-content/uploads/.htaccess" 2>/dev/null

find "$SITE/wp-content/plugins" -maxdepth 1 -regextype posix-extended -regex ".*($BAD_PLUGINS_REGEX).*" -exec rm -rf {} + 2>/dev/null

chown -R edouarddupressoir:edouarddupressoir "$SITE"
find "$SITE" -type d -exec chmod 755 {} \;
find "$SITE" -type f -exec chmod 644 {} \;

mkdir -p "$SITE/wp-content/uploads"
chown -R edouarddupressoir:www-data "$SITE/wp-content/uploads"
find "$SITE/wp-content/uploads" -type d -exec chmod 775 {} \;
find "$SITE/wp-content/uploads" -type f -exec chmod 664 {} \;

echo -e "<Files *.php>\n    deny from all\n</Files>" > "$SITE/wp-content/uploads/.htaccess"
chown edouarddupressoir:www-data "$SITE/wp-content/uploads/.htaccess"
chmod 644 "$SITE/wp-content/uploads/.htaccess"
chattr +i "$SITE/wp-content/uploads/.htaccess"

echo '<?php define("WP_USE_THEMES", true); require __DIR__ . "/wp-blog-header.php";' > "$SITE/index.php"
chattr +i "$SITE/index.php"

chmod 660 "$SITE/.htaccess" 2>/dev/null
chattr +i "$SITE/.htaccess"

echo "Proceso de optimización de seguridad y acceso completado para $SITE"


grep -r "targetprint.online" /etc/apache2/sites-available/