Being attacked by hackers has become a synonym for a new start, lost content and access to websites. The problem is that you can have everything and a pack of chips. Computer chip. Very good. Although this may not be a package of computer chips, you do not need to cut and paste the entire website that worked hard after being attacked by hackers. Although it seems easier to clean up all hidden spam, broken pages and malware after a hacker invasion, managing a site after a disaster does not have to be complicated or difficult. Even if the administrator dashboard (or database) is locked and there is no backup to restore, it can be easily modified. You can continue to save content and sites from spam and malware. The
Today, we will show you how to manually migrate WordPress content, view database records, modify spam and malware, and change administrator login credentials (if the administrator dashboard or database is inaccessible and there is no account). Valid backup. Feel free to skip to the part you want to read carefully. The most appropriate parts include: The thing to do when locking is to back up the database access database records confirm the login credentials change content migrate when the database is inaccessible, I don’t want to miss anything (and you don’t have to do it!) If you can’t access the word press Management Dashboard when locking, the best way is to view the database. Usually, you can still access it because it is not as corrupt as the back end of the site. The
Below, you can find out how to access the database, restore and migrate content, change login credentials, and reset word press and multisite. If the opposite applies to the site and the database is hacked, but the administrator dashboard is still accessible, please ensure that the database cannot be accessed in the future. Backing up your WordPress site may not seem very popular right now, but you can also back up your site just in case. In this way, even if there is a problem on the way, it can be recovered. Absolutely not. It’s better to prepare in advance. The
Do I sound like a boy scout? Well, this is not true, so please continue to back up the database. For more information, check how to create manual backups when WordPress is turned off or locked, how to back up WordPress databases, and how to use snapshots to back up WordPress websites (and multi sites). To access the database management WordPress site through the database, you must first access it, and then access it through phpMyAdmin, SSH, or cPanel. For more information, check the WordPress terminal and quick guide to command line prompts. The
To access the database through cPanel, log in to the account and go to database >phpmyadmin. Access phpMyAdmin to start database management. Once the page is loaded, locate the databases listed on the left and click to display all the tables in the site. Here, you can manage the WordPress site as follows: Male click database in the list on the left of phpMyAdmin main screen. If you do not know the database of the WordPress site, WP config. You can search and find PHP files. The
Return to cPanel and click File > file manager. Then go to the root directory of the site, where WP config is listed. Click the PHP file. Then click the Edit button at the top of the page to open the code editor. ‹ WP config Click the PHP file, and then click the Edit button to open the code editor. Pop up menu show character nose
Select the UTF-8 option from the drop-down box and click the Edit button. Select the UTF-8 option, and then click Edit to view the code in the file. Next, look for code similar to the following example to find the database name of the database on the WordPress site. The
Load summary jennimckinnon\/85aad477e9ee482a792f936aa70b45a6 database\u name\u here instead of WP config. The PHP file displays the actual name of the database_name_here. This is the name you need to click in phpMyAdmin to access and manage the site through the database tables. Database history confirmation before changing the database, you must check the history log to determine if there are exceptions. If you see you or the person you accessed or changed the table, rather than the person who granted access, it may be a hacker. The
It is best to check the records later for two reasons: Since there are more items to sort, you do not want to add legal items to the record. In this way, it is not clear where and when hackers invade the database. PhpMyAdmin only saves the last 25 operations, so when you start to change or access the table, you can completely delete the items that will become the clues of hacker attacks. If you know which forms have been tampered with, you can modify or export the forms, edit the changes made by spam or hackers, and save the contents. This will be discussed later, but from now on, it is very important to view the records in the database. The
Log in to \
If you forget to change your login credentials password and cannot recover it, or your site is hacked and your account is locked, you can modify the account details through the database. By searching the wp_users table, you can determine whether there are suspicious accounts that do not look like real accounts. If you think it is illegal, you can delete the table. You can also view the wp_sitemeta table and the site_admins field to learn more about wp\u sitemeta. Ensure that each account has traces of tampering. Please confirm that you continue to be attacked by hackers for details. A method to prevent the malicious use of WordPress backdoors. The
You can also change your email and password at the same time. In phpMyAdmin, make sure that the database is selected on the left. Then click the wp_users table. The list of all user accounts on the site must appear on the right. Locate the account in the list and click the Edit button on the same row. Male edit user account, change email or password. In the user_pass function drop-down box, you can select MD5 to change the password of the account. This allows you to add an unencrypted password. Don’t worry. If you save the changes within one minute, the password will be encrypted. Changing this feature makes it easier to change your password. You can now replace the contents of the user_pass value field with the new password. If you also want to change the email address of your account:
Exporting files to Hal and human readable CSV files may be helpful. You can edit the required content there, and then only migrate the good content. However, you must export each table group individually and all of them. This allows you to migrate the site later to prevent damage to the site. Certain types of content will be targeted by spam and malware. After exporting and editing the table that stores this data, you can capture all content inserted by hackers and delete it before migrating site content. The following is a list of table groups that typically need to be exported to edit the target content type: Posts and pages – wp\u Posts comments – wp\u comments categories – wp\u terms tags – wp\u term\u taxonomy users – wp\u users (don’t forget that passwords are serial). Topic settings – usually stored in the wp_options table group, but not always. If you want to find out, please consult the subject author. Plug in settings – the tables to be exported vary from plug-in to plug-in. Typically, each plug-in has its own set of tables. Consult the plug-in creator for details on the specific tables that need to be exported. If you have time, it is best to make sure that all tables have malware and spam. The details are how to organize my website after being on the hacker and blacklist. Please help me. I was attacked by hackers! How to solve and repair WordPress website problems and continue to be attacked by hackers? A method to prevent the malicious use of WordPress backdoors. Now that you know what the tables to edit and migrate are, start moving. If the data export and editing manager dashboard in the database is locked and can access the database, you can recover the content and edit spam or other data added by hackers. As mentioned earlier, you can view the history of tasks performed in the database. If you know which tables have not been tampered with, you can export them as SQL files. Tables attacked by hackers can be exported as CSV files, so they can be deleted before spam or added data is added to the site again. Exporting tables as SQL files can be executed in database tables that have not been hacked by hackers or in phpMyAdmin. Click the database that contains the tables you want to export, and then click the export tab at the top of the page. Select the custom radio button, and then select the table to export from the list. This is a multiple selection box. You can press shift on the keyboard, and then click one of the tables to highlight the table and the table before it. Instead, you can press Ctrl or command, and then click each table you want to select. Male select the specific table to export. Other settings are OK. Scroll to the bottom of the page, and then click move. Then save the file to your computer. For tables that have been found to have hackers exporting and editing spam information, you can export them to a CSV file for a simple editing environment. You can delete spam and store as much content as possible. Unless you find a table that contains only junk information but no actual content. In this case, you can delete all tables. Tables with mixed genuine and spam content can be exported and modified. In phpMyAdmin, click the database on the left that contains the tables you want to export, and then click the export tab. Select the custom radio button, and then select the table to export, as described above. Under format, select CSV instead of the default SQL option. More options must be displayed dynamically. In subsequent versions of phpMyAdmin, field delimited columns will be filled with commas, which is required. In previous versions, you must change from a semicolon to a comma
Therefore, please edit the traces of hackers and migrate the content to the new installation of WordPress. Some spam and other inserted data may have disappeared, but there may be some slow stragglers to delete. After completion, please confirm again that all contents have been uploaded successfully. If everything is OK, please delete the old website immediately. This prevents Hacher from causing additional damage. Change your login credentials to a managed account and other similar accounts, such as WHM or cPanel. If you think it prudent to try to update as many login details as possible, you won’t. Since it may be difficult for hackers to know what items they can access, it is recommended that you change all login credentials related to managed accounts, including email addresses. The details include the ultimate guide to WordPress security, hackers and my website cleaning methods on the blacklist and being attacked by hackers. Please confirm! How to solve and repair WordPress site problems. I don’t want to miss anything (and you don’t have to do it!) Losing all WordPress website content is one of the most fatal aspects of being hacked or locked down by mistakes. Fortunately, in both cases, you can restore content and save the site. It is recommended to follow the above details and move. Do you always think that WordPress will disappear after being attacked by hackers? What is the most difficult part after being hacked or the account is locked? What makes it easier to modify the process? Please feel free to share the following comments. Label: migration support database