ACKNOWLEDGEMENTS
This research was supported by the German Federal
Ministry of Education and Research (BMBF) through
the Open6GHub project (Grant 16KISK003K).
REFERENCES
Andreasen, M. (2016). Protect + Stop WPScan
WordPress User Enumeration with Varnish.
https://guides.wp-bullet.com/protect-stop-wpscan-
wordpress-user-enumeration-varnish/. Accessed:
2022-09-28.
AstraSecurity (2020). Astra Security Suite – Firewall
& Malware Scan. https://wordpress.org/plugins/
getastra/. Accessed: 2022-09-28.
Automatic (2022). Jetpack Protect. https://wordpress.org/
plugins/jetpack-protect/. Accessed: 2022-09-28.
Behera, C. K. and Bhaskari, D. L. (2015). Different Ob-
fuscation Techniques for Code Protection. Procedia
Computer Science, 70:757–763. Proceedings of the
4th International Conference on Eco-friendly Com-
puting and Communication Systems.
Bell, J. B. and Whaley, B. (1991). Cheating and Deception
(1st ed.). Transaction Publ, New Brunswick.
BlogSafe.org (2021). BlogSafe Honeypot. https://
wordpress.org/plugins/blogsafe-honeypot/. Accessed:
2022-09-28.
Boiko, B. (2005). Content Management Bible. Bible. Wiley.
CreativeMotion (2022). Titan Anti-spam & Security. https:
//wordpress.org/plugins/anti-spam/. Accessed: 2022-
09-28.
Cyberpunk (2019). WPScan Usage Example [Enumeration
+ Exploit]. https://www.cyberpunk.rs/wpscan-usage-
example. Accessed: 2022-09-21.
de Barros, A. (2007). Dlp and honeytokens.
Donini, R. (2017). Don Security. https://wordpress.org/
plugins/don-security/. Accessed: 2022-09-28.
Efendi, A. M., Ibrahim, Z., Zawawi, M. A., Abdul Rahim,
F., Pahri, N. M., and Ismail, A. (2019). A Survey on
Deception Techniques for Securing Web Application.
In 2019 IEEE 5th Intl Conference on Big Data Secu-
rity on Cloud, pages 328–331.
Fraunholz, D., Anton, S. D., Lipps, C., Reti, D., Krohmer,
D., Pohl, F., Tammen, M., and Schotten, H. D.
(2018a). Demystifying Deception Technology:A Sur-
vey.
Fraunholz, D., Reti, D., Duque Anton, S., and Schotten,
H. D. (2018b). Cloxy: A Context-Aware Deception-
as-a-Service Reverse Proxy for Web Services. In Pro-
ceedings of the 5th ACM Workshop on Moving Target
Defense, MTD ’18, page 40–47. ACM.
Fullworks (2022). Stop User Enumeration. https://
wordpress.org/plugins/stop-user-enumeration/. Ac-
cessed: 2022-09-28.
InfosecMatter (2020). CMS Vulnerability Scanners
for WordPress, Joomla, Drupal, Moodle, Typo3..
https://www.infosecmatter.com/cms-vulnerability-
scanners-for-wordpress-joomla-drupal-moodle-
typo3/. Accessed: 2022-09-21.
Jagamogan, R. S., Ismail, S. A., Hafizah, N., and
Hafiza Abas, H. (2021). A Review: Penetration
Testing Approaches on Content Management Sys-
tem (CMS). In 2021 7th International Conference
on Research and Innovation in Information Systems
(ICRIIS), pages 1–6.
Jerkovi
´
c, H., Vrane
ˇ
si
´
c, P., and Dadi
´
c, S. (2016). Secur-
ing web content and services in open source con-
tent management systems. In 2016 39th International
Convention on Information and Communication Tech-
nology, Electronics and Microelectronics (MIPRO),
pages 1402–1407.
McRae, S. (2017). Blocking the scanners — WP-
Scan. https://gorgolak.wordpress.com/2017/05/27/
blocking-the-scanners-wpscan/. Accessed: 2022-09-
28.
NovaSense (2020). NovaSense. https://wordpress.org/
plugins/novasense-security/. Accessed: 2022-09-28.
Plugins, W. W. S. (2022). Hide My WP Ghost – Se-
curity Plugin. https://de.wordpress.org/plugins/hide-
my-wp/. Accessed: 2022-10-05.
rluisr (2016). block-wpscan. https://wordpress.org/plugins/
block-wpscan/. Accessed: 2022-09-28.
Shift8 (2019). How to block your WordPress site
from being scanned by WPScan with Nginx.
https://shift8web.ca/2019/01/how-to-block-your-
wordpress-site-from-being-scanned-by-wpscan-
with-nginx/. Accessed: 2022-09-28.
Spitzner, L. (2003). The honeynet project: trapping the
hackers. IEEE Security & Privacy, 1(2):15–23.
Starr, J. (2022). Blackhole for Bad Bots. https:
//wordpress.org/plugins/blackhole-bad-bots/. Ac-
cessed: 2022-09-28.
Talk, M. (2022). How to Change The WordPress Login
URL Without Plugin. https://www.mediumtalk.net/
change-wordpress-login-url-without-plugin/. Ac-
cessed: 2022-10-05.
tinyShield.me (2022). tinyShield – Simple. Focused. Se-
curity. https://wordpress.org/plugins/tinyshield/. Ac-
cessed: 2022-09-28 and 2022-12-19.
Valenza, A., Costa, G., and Armando, A. (2020). Never
Trust Your Victim: Weaponizing Vulnerabilities in Se-
curity Scanners.
W3Techs (2022). Usage statistics of content management
systems. https://w3techs.com/technologies/overview/
content\ management. Accessed: 2022-09-21.
WPScan (2022). WordPress Vulnerability Statistics. https:
//wpscan.com/statistics. Accessed: 2022-09-20.
WPScanTeam (2022). WPScanTeam WPScan Github.
https://github.com/wpscanteam/wpscan. Accessed:
2022-09-21.
WPSmartSecurity (2015). WP Smart Security. https://
wordpress.org/plugins/wp-smart-security/. Accessed:
2022-09-28.
Yuill, J. J. et al. (2007). Defensive Computer-Security
Deception Operations: Processes, Principles and
Techniques. https://repository.lib.ncsu.edu/handle/
1840.16/5648. Accessed: 2022-09-21.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
492