Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

WordPress Site Clean-up

wordpress database spoofing

Best Answer briz_dad , 11 August 2015 - 05:07 PM

Hello G2G Admin, Thanks for the response... it wasn't the config file. I finally found two "burried" .js files that were creating the mess. Site seems clean now... ~ Greg Go to the full post »


  • Please log in to reply

#1
briz_dad

briz_dad

    Member

  • Member
  • PipPipPip
  • 251 posts

Hello Enfold,

I am working with a client's site that is using the WordPress Enfold theme.
org-consult.com

It seems a while back, the site was hacked. I believe due diligence for the site's security has been done. However, there is still a mess of "pages" to be cleaned out.

EXAMPLES
http://www.org-consu...riting-services
http://www.org-consu...our-best-friend

I think there are potentially around a thousand of them - this based on our Google Analytics (which is how they were discovered in the first place).

Our site is hosted with GoDaddy and they can give us no support with this.

Also, these "pages" do not exist in the ADMIN of the site; neither as pages or posts.

My concern with messing with the Db on my own is that it looks to me that the Enfold theme uses post elements for elements contained on a page - and that the default WordPress structure does, too.

With my limited knowledge, I am liable to blow-out real content in attempting to delete these "pages".

Can you help direct me with the clean-up?

Sincerely,
Greg


  • 0

Advertisements


#2
admin

admin

    Founder Geek

  • Administrator
  • 24,501 posts
Do you have FTP access? if so, first download the home directory where the blog is located. Next delete everything except wp-config.php, open wp-config.php in a text editor like notepad++ and look for unknown characters or code added to the end of the file. Or better yet, copy the database name, password, and server into a new config file. Upload fresh Wordpress and theme files. Replace any theme customizations and upload logo and other graphics that were changed or created from backup.
  • 0

#3
briz_dad

briz_dad

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 251 posts
✓  Best Answer

Hello G2G Admin,

 

Thanks for the response... it wasn't the config file.

 

I finally found two "burried" .js files that were creating the mess.

 

Site seems clean now...

 

~ Greg


  • 0

#4
admin

admin

    Founder Geek

  • Administrator
  • 24,501 posts
Good news. If you haven't already,setup WordPress to auto update the core and plugins. Most hacks are caused by outdated software. pleasehttps://codex.wordpr...kground_Updates
  • 0






Similar Topics


Also tagged with one or more of these keywords: wordpress, database, spoofing

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP