by axew3 » Tue Sep 15, 2020 7:29 am
You have completely reason, also because it is annoying to get emails informing you that your account has been locked due to bruteforce attack. Also, if there is an undiscovered vulnerability, may the fact that an admin account is not exposed and not known, nullify the security bug. It depend.
Days ago, i discovered into an old domain i own where a very old vBulletin was running, that someone has been able to rewrite the htaccess on root, and put files on the server root.
The hack was redirecting any user visiting the site to a malicious site.
The fact that they have been able to overwrite the htaccess and upload files into root, impressed me. The php version running on server was the php vulnerable 7.1version. Together with the old of years vBulletin, has been a joke for them to break into. In this case, the fact i had or not exposed admin accounts, was not relevant. They bypassed any security wall using a vulnerability on server, and on the old vBulletin bugs.
So your way to do is the best practice, mine is a (dangerous) fun game, that by the way, go on from years now here on this site, that i check and update constantly.
You have completely reason, also because it is annoying to get emails informing you that your account has been locked due to bruteforce attack. Also, if there is an undiscovered vulnerability, may the fact that an admin account is not exposed and not known, nullify the security bug. It depend.
Days ago, i discovered into an old domain i own where a very old vBulletin was running, that someone has been able to rewrite the htaccess on root, and put files on the server root.
The hack was redirecting any user visiting the site to a malicious site.
The fact that they have been able to overwrite the htaccess and upload files into root, impressed me. The php version running on server was the php vulnerable 7.1version. Together with the old of years vBulletin, has been a joke for them to break into. In this case, the fact i had or not exposed admin accounts, was not relevant. They bypassed any security wall using a vulnerability on server, and on the old vBulletin bugs.
So your way to do is the best practice, mine is a (dangerous) fun game, that by the way, go on from years now here on this site, that i check and update constantly.