Forum Moderators: rogerd & travelin cat
WPScan, WPSeku Vulnerability Scanners
GET /subdir/.wp-config.php.swp HTTP/1.1
GET /subdir/%23wp-config.php%23 HTTP/1.1
GET /subdir/wp-config.bak HTTP/1.1
GET /subdir/wp-config.old HTTP/1.1
GET /subdir/wp-config.orig HTTP/1.1
GET /subdir/wp-config.original HTTP/1.1
GET /subdir/wp-config.php_bak HTTP/1.1
GET /subdir/wp-config.php.bak HTTP/1.1
GET /subdir/wp-config.php.old HTTP/1.1
GET /subdir/wp-config.php.orig HTTP/1.1
GET /subdir/wp-config.php.original HTTP/1.1
GET /subdir/wp-config.php.save HTTP/1.1
GET /subdir/wp-config.php.swo HTTP/1.1
GET /subdir/wp-config.php.swp HTTP/1.1
GET /subdir/wp-config.php%7E HTTP/1.1
GET /subdir/wp-config.save HTTP/1.1
GET /subdir/wp-config.txt HTTP/1.1
GET /wp-config-sample.php HTTP/1.1
GET /wp-config.backup HTTP/1.1
GET /wp-config.bak HTTP/1.1
GET /wp-config.bck HTTP/1.1
GET /wp-config.old HTTP/1.1
GET /wp-config.php~ HTTP/1.1
GET /wp-config.save HTTP/1.1
GET /wp-config.back HTTP/1.1
GET /wp-config.copy HTTP/1.1
GET /wp-config.dat HTTP/1.1
GET /wp-config.db HTTP/1.1
GET /wp-config.tar.gz HTTP/1.1
GET /wp-config.tmp HTTP/1.1
GET /wp-config.txt HTTP/1.1
GET /wp-config.zip HTTP/1.1
Thanks Torontoboy, could you post the range as well?
<files wp-config.php>
order allow,deny
deny from all
</files>
I tried WordPress Security Scan and wploop.com and I was pretty satisfied.
Google Safe browse checks have been performed on each of the linked sites. Links with poor reputation could be a threat to users of the site. Hosting and location are also included in the results.