The Audit Tools for WordPress and Joomla Security & Best Practice – find hacks!

Start a FREE audit of your site now!

In this blog post I’m going to cover the basics of the security audit for Joomla and WordPress sites using the unique tools found in

Once your site is connected to the service, you can run UNLIMITED audits of your site on demand, or schedule them to run daily, weekly or monthly.

Other services claim to have an “audit” tool. Most of the time they mean they have implemented the Sucuri SiteCheck API, which only “scans” your site as a visiting browser would, it doesn’t check the files in your webspace, and doesn’t find anything that is hidden under the surface of your rendered webpages. Be warned. Not all “Audits” are in-depth and comprehensive!

Make sure you compare apples with apples. Not everyone claiming to be an “apple” is.

At the start of every audit we also run our snapshot tools, capturing over 100 quick checks of your site. Added to the audit that’s even more checks!

The audit first compiles a list of all the folders in your webspace – without exceptions – and then grabs a list of the files in those folders.

We then run an exhaustive process which includes:

  • Identifying it the file is a core Joomla or WordPress file
  • If it’s a core file, identifying if that file has been modified since release
  • If the core file is modified, doing a comparison with the original file
  • Storing the md5 hash of the file for future comparison
  • Looping through every single line of code in every single file
  • Searching every single line of code, for one of nearly 2000 patterns of previous hacks we have seen, and if found marking a file as “suspect”
  • Checking the md5 hash of the file against over 14,000 specific md5 hashes of previously declared “hacked” files. There are no false positives, each of these 14,000 md5 hashes has been manually checked and confirmed to match a file which is hacked
  • We check the created, modified and other metadata of each file, including the EXIF data on images (where hacks are known to reside!)
  • We identify any encrypted files, PHP error logs, Archive files, files over 2mb in size, zero byte files and many other classifications

Once the audit is over we notify you so you can login to and review the results. The screenshot below shows the first three sections of the audit tab.

Example Audit Results (truncated)

As you can see we display the audit results in the same format as the snapshot tab, with the number of problems, name of the tool, a link to any video, a helpful learn more page, and a button used to investigate our findings.

Suspect Files Tool

Our most popular tool is the suspect content tool.

This is the tool that lists all the files that have matched either our 2000ish regex patterns, or one of our 14,000 md5 hashes. Just because a file is listed doesnt mean its hacked, unless we specifically state so, as the regex pattern matches are designed to raise false positives and highlight other things (like hidden spammy links to template providers!).

If your file is a known backdoor for a hacker – we mark it as such!

By clicking any of the file names, you can see a preview of the section of the file we think is suspect. You can also see when it was modified, its size, and its permissions.

You can use our tools to edit the file directly in and then save the changes, and we will upload them to your site – no need to find your FTP Client! You can also delete the whole file with a single click.

Hacked Hashes

Example export from our database.

One of the things that sets us apart from every other service, is that we crowdsource data on hacks and backdoors.

In practice, this means that once a hack is discovered and confirmed on one Joomla site (for example), patterns and regexp are created, approved, and rolled out to the 62,000+ sites the next time they are audited. Including your sites!

This means you benefit from the discovery of emerging hacks and trends we see on other sites. Our system is totally dynamic and self-improving, even without human interaction and people often find hacks on their site when they add them to, that have been left dormant for years, or badly cleaned on previous clean ups.

Fully automated improvements to our detection

Furthermore, we can manually improve the audit (and we do) multiple times a day, and with our automatic rollout/upgrade of our tools connector on your site – you get the very latest protection without having to manually upgrade our connector!

File Information Tools

One of the main sections in the audit tab is the list of File Information Tools.

These allow you to investigate a list of files that match certain classifications, such as encrypted files, or files over 2mb.

Over the years these are the tools we have used to identify new and emerging hacks, or to look for something specific, like files that allow file uploads or sending email for example.


The audit is unlike any other service you will read about.

We do not buy in someone else’s API, all our hack detection is based on over a decade of real life hacks for Joomla and WordPress (and not generic rule based detection like others)

If your site is hacked, will discover that, and inform you, and give you the tools you need to fix your site yourself! After all, was created because, at the time, I was doing all this manually myself to fix hacked client sites and I needed a way to automate much of what I did.

BONUS: Out of your depth? Need help?

If the audit finds your Joomla or WordPress site is hacked, and you are unsure how to fix it with our tools, or just want us to take care of everything for you, you can escalate this to us using the service at for SET FEE priced hack fixes.

Tim Davis

Free Bonus Joomla Content!

"Hey there Joomla Fanatics, Tim Davis here, I'm a Joomla fan too! I have a great BasicJoomla Youtube Channel full of helpful Joomla tutorials and videos just waiting for you, on YouTube."

Watch Joomla Videos or visit Tim's website