{"id":1542,"date":"2012-01-16T09:34:50","date_gmt":"2012-01-16T08:34:50","guid":{"rendered":"https:\/\/www.creativejuiz.fr\/blog\/?p=1542"},"modified":"2015-01-18T16:17:00","modified_gmt":"2015-01-18T15:17:00","slug":"wordpress-securisez-votre-site-grace-a-quelques-astuces","status":"publish","type":"post","link":"https:\/\/www.creativejuiz.fr\/blog\/tutoriels\/wordpress-securisez-votre-site-grace-a-quelques-astuces","title":{"rendered":"Dossier WordPress &#8211; S\u00e9curisez votre site gr\u00e2ce \u00e0 quelques astuces"},"content":{"rendered":"<p>Il existe un certain nombre d&rsquo;indices lors de l&rsquo;exploration d&rsquo;un site qui peuvent aider le hacker \u00e0 d\u00e9voiler des failles de s\u00e9curit\u00e9. Il existe \u00e9galement des choses basiques \u00e0 mettre en place pour vous pr\u00e9munir de ces quelques failles.<!--more--><\/p>\n<p>Ce dossier est issu de nombreuses recherches et impl\u00e9mentations des techniques au fil du temps (depuis environ 2010). N&rsquo;\u00e9tant pas un expert en s\u00e9curit\u00e9 web, je t\u00e2cherai tout de m\u00eame de vous expliquer l&rsquo;utilit\u00e9 de chacune des astuces fournies.<\/p>\n<p class=\"message note\">Certaines de ces manipulations ne se limitent pas au contexte d&rsquo;une installation WordPress.<\/p>\n<div class=\"tdm\">\n<h2>Sommaire du dossier<\/h2>\n<ol>\n<li><a href=\"\/blog\/wordpress\/wordpress-conseils-securite-bien-debuter-entretenir-son-site\">Conseils de s\u00e9curit\u00e9 pour bien d\u00e9buter<\/a><\/li>\n<li><a href=\"\/blog\/wordpress\/dossier-wordpress-plugins-ameliorer-securite\">Quelques plugins pour am\u00e9liorer la s\u00e9curit\u00e9 de WordPress<\/a><\/li>\n<li><a href=\"\/blog\/wordpress\/dossier-ameliorer-securite-wordpress-hooks\">Am\u00e9liorer la s\u00e9curit\u00e9 de WordPress avec quelques hooks<\/a><\/li>\n<li><a href=\"\/blog\/wordpress\/dossier-securiser-wordpress-fichier-htaccess\">S\u00e9curiser davantage WordPress avec le fichier .htaccess<\/a><\/li>\n<\/ol>\n<\/div>\n<h2>Remerciements<\/h2>\n<p>Quelques remerciement \u00e0 mes diff\u00e9rentes sources dont certaines sont list\u00e9es ci-dessous.<br \/>\nMerci aussi \u00e0 <a href=\"http:\/\/boiteaweb.fr\" title=\"Consultant en s\u00e9curit\u00e9 Web\">Julio<\/a> qui m&rsquo;a signal\u00e9 quelque faille dans certains codes li\u00e9s \u00e0 <code>.htaccess<\/code>, merci \u00e0 lui pour les plugins cit\u00e9s dans ce dossier, puisque parmi ceux pr\u00e9sent\u00e9s il en a con\u00e7u !<\/p>\n<div class=\"sources\">\n<h2>Sources et liens utiles<\/h2>\n<ul>\n<li><a href=\"http:\/\/boiteaweb.fr\">Bo\u00eete \u00e0 Web &#8211; Conseils en s\u00e9curit\u00e9<\/a><\/li>\n<li><a href=\"http:\/\/www.segmentationfault.fr\/securite-informatique\/contourner-htaccess-limit-get-post\/\">Faille <code>.htaccess<\/code> &#8211; Contourner la <code>limit get post<\/code><\/a><\/li>\n<li><a href=\"http:\/\/perishablepress.com\/5g-firewall-beta\/\" hreflang=\"en\">5g Firewall beta (en)<\/a><\/li>\n<li><a href=\"http:\/\/www.josiahcole.com\/2007\/07\/11\/almost-perfect-htaccess-file-for-wordpress-blogs\/\" hreflang=\"en\">Un exemple de fichier <code>.htaccess<\/code> s\u00e9curisant (en)<\/a><\/li>\n<li><a href=\"http:\/\/wp.smashingmagazine.com\/2010\/07\/01\/10-useful-wordpress-security-tweaks\/\" hreflang=\"en\">Une liste d&rsquo;astuces sur la s\u00e9curit\u00e9 &#8211; SmashingMagazine (en)<\/a><\/li>\n<li><a href=\"http:\/\/www.webanddesigners.com\/20-htaccess-hacks-to-prevent-your-wordpress-site-from-hacking\/\" hreflang=\"en\">Des hacks de s\u00e9curit\u00e9 &#8211; WebAndDesigners (en)<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Il existe un certain nombre d&rsquo;indices lors de l&rsquo;exploration d&rsquo;un site qui peuvent aider le hacker \u00e0 d\u00e9voiler des failles de s\u00e9curit\u00e9. Il existe \u00e9galement des choses basiques \u00e0 mettre en place pour vous pr\u00e9munir de ces quelques failles.<\/p>\n","protected":false},"author":4,"featured_media":1851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_bluesky_dont_syndicate":"","_bluesky_syndication_accounts":"","_bluesky_syndication_text":"","footnotes":""},"categories":[50,9,12,13],"tags":[381,434,318,430,233,51,395,431],"coauthors":[597],"class_list":["post-1542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ressources-telechargements","category-tutoriels","category-veille-technologique","category-wordpress","tag-admin","tag-hook","tag-htaccess","tag-injection","tag-php","tag-plugin","tag-securite","tag-sql"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/posts\/1542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/comments?post=1542"}],"version-history":[{"count":0,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/posts\/1542\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/media\/1851"}],"wp:attachment":[{"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/media?parent=1542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/categories?post=1542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/tags?post=1542"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.creativejuiz.fr\/blog\/wp-json\/wp\/v2\/coauthors?post=1542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}