Penetration test: How secure is your WordPress website really?

penetration test hacker during the penetration test

Share the blog with others

From the Daily Pentest Business

A penetration test uncovers security gaps in a WordPress site, but the security gaps are not directly related to WordPress. We show how secure a WordPress website can really be.


What is a penetration test?

Basics of a Pen Test

Pentration tests, or pen tests, are simulated cyberattacks conducted by security experts to find vulnerabilities in IT systems. These tests help identify and mitigate security risks before real attackers can exploit them.


The start of the test

Discovery of the .bash_history file

Our test began with a discovery on the client's WordPress site, where we came across the .bash_history file. This file, which is typically hidden, stores command history and should not have been accessible. Its presence indicated a security vulnerability.


Analysis of the discovery & insight into the backup

The information found in the command history allowed us to download a backup file. This not only contained all the website's data but also sensitive information like email credentials.


Cracking the encrypted password

Access to the email account

By decrypting the password stored in the database, we were able to gain access to an important email account. This account was used not only for WordPress notifications but also for other critical business services like the ticketing system.


Expanding access

Access to additional business services

With the credentials, we were able to access the customer's Microsoft 365 account, which gave us insight into sent emails from the inbox, notifications with the content of the ticket system updates, MS Teams channels, and SharePoint folders.


Security in everyday comparison

A penetration test is comparable to a test of whether the doors and windows of a house are securely locked to deter burglars. Thus, we prevent digital "break-ins" into your IT infrastructure.


Security recommendations and best practices

Protective measures for your IT security
  • File Protection: Sensitive files like .bash_history must be protected.

  • Backup Security: Store backups securely and password-protected.

  • Email Management: Consider whether storing sent emails is necessary and delete them regularly.

  • Dedicated Email Accounts: Use separate accounts for different services/applications.


Are you ready to assess the security of your systems? Contact us for a professional evaluation and improve your security measures. Let's secure your digital future together.


Curious for more? Contact us now!