Brute force login attempts despite CAS
-
Hello,
My site has always been hit several times a day by some random login attempts so we decided to add a few layers of protection to prevent that. We first set up the login with our University CAS authentication and disabled the regular WordPress login (it means that any attempts to login to wp-admin would redirect you to the university CAS login page instead of the WordPress one). I also installed a plugin to change the default login URL.
But despite all of the above, I still get the same amount of brute force login attempts according to the logs. I really don’t understand why since the login page is not accessible anymore because of the CAS plugin and if I try to go to mysite/wp-login.php or mysite/wp-admin I get redirected to a “page not found” since the default URL is changed by the plugin (so it’s working). So how the hackers manage to bypass that? It might be easy since I get hit multiple times a day but I cannot reproduce it. Even if I do a wrong authentication in CAS there is no failed login attempt in the logs since I go through the university authentication page (so the information that the login failed doesn’t even reach WordPress).
Any clues about how the hackers manage to reach the WordPress login?
- The topic ‘Brute force login attempts despite CAS’ is closed to new replies.