Support » Plugin: Exploit Scanner » Exploit Scanner added nwp- to database?

  • I see things in my database that I don’t understand.

    “nwp-” is added to familiar files and folders, but they don’t exist on the server. Here are some examples:
    \nwp-includes/js/tinymce/license.txt
    \nwp-content/plugins/
    \nwp-content/uploads/
    /.htaccess\nwp-config-sample.php

    Are these things created by Exploit Scanner? Are they supposed to be in the database?

Viewing 3 replies - 1 through 3 (of 3 total)
  • Plugin Author Jon Cave

    (@duck_)

    WordPress Dev

    Could you clarify on where you’re seeing these entries in the database (table, column, etc.). It looks like it’s not “nwp-” but rather the newline character which is displayed as “\n” is being stored.

    Jon,

    I think you’re right. Thanks for explaining that to me!

    I don’t know much about databases. I tried to find where the entries are in the database using phpMyAdmin, but don’t know how.

    I see the content in the .sql file I exported from phpMyAdmin. Here’s an example:
    \nwp-content/uploads/image1.jpg\nwp-content/uploads/document.pdf\nwp-content/uploads/image2.jpg\nwp-content/uploads/image3.jpg\nwp-content/uploads/image3.jpg\nwp-content/uploads/image1.gif

    Plugin Author Jon Cave

    (@duck_)

    WordPress Dev

    Okay, I guess then it’s just how phpMyAdmin is exporting the file and how your program displays this information (i.e. actually showing the \n instead of a newline itself). If you want to find out where abouts in the database this is you will have to look in your .sql file and look at the statements that phpMyAdmin generated (I think that’s how it exports it), to see which table the data is INSERTed into. FYI the only information Exploit Scanner puts in the database is found in the wp_options table where the option_name starts with “exploitscanner_”.

    Sounds like nothing to do with Exploit Scanner 🙂

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘Exploit Scanner added nwp- to database?’ is closed to new replies.