SlideShare ist ein Scribd-Unternehmen logo
1 von 48
 
DRE ARMEDA,CISSP @ DREMEDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SUCURI .NET DRE .IM
THE WEB IS GROWING ,[object Object],[object Object],[object Object]
INNOVATION & CREATIVITY
ITS NOT ALL PEACHY
WHAT IS MALWARE? ,[object Object],Malware, short for malicious software, is a software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
 
ATTACKERS LOVE YOU ,[object Object],[object Object],[object Object]
HOW BAD IS IT? ,[object Object],[object Object],[object Object]
ENCODED JAVASCRIPT Impact:  Website pages may be used to serve malicious downloads to visitors. Downloads may be used to infect desktop computers, and/or exploit FTP info.  Typical Entry Point:  Outdated, known vulnerable software; exploited desktop computers; exploited FTP credentials. JavaScript that is obfuscated(hidden) so that you can’t tell what it is. It is injected into files/pages on the site and used to serve malware.
ENCODED JAVASCRIPT /wp-admin/js/cat.js – CLEAN
ENCODED JAVASCRIPT /wp-admin/js/cat.js – INFECTED
ENCODED JAVASCRIPT /wp-admin/js/cat.js – INFECTION DECODED – Somewhat  
ENCODED JAVASCRIPT ,[object Object],[object Object],[object Object],[object Object],How it works:
ENCODED JAVASCRIPT ,[object Object],[object Object],[object Object],[object Object],QUICK TIP:  Check Google to see if you’re infected -  site:{yourdomain.com} viagra
CONDITIONAL REDIRECTS Impact:  When traffic is coming from a specific referrer (i.e. Google, Bing), the site is redirected to a malicious website. Typical Entry Point:  Outdated, known vulnerable software. An attack the causes a website to redirect to a malicious website based on referrer, web browser, operating system.
CONDITIONAL REDIRECTS Infected .htaccess file:
CONDITIONAL REDIRECTS Result of conditional redirect:
CONDITIONAL REDIRECTS ,[object Object],[object Object],[object Object],[object Object],How it works:
CONDITIONAL REDIRECTS ,[object Object],[object Object],[object Object],[object Object]
PHARMA HACK Impact:  Website page and post titles, descriptions and links are changed to display pharmaceutical ads and links back to malicious websites on search engine result pages. Typical Entry Point:  Outdated, known vulnerable software. Pharma Hack is a type of SEO poisoning. Attackers manipulate their search engine results to make their links appear higher than legitimate results.
PHARMA HACK Results of scanning rendered source.:
PHARMA HACK Google Search Engine Results:
PHARMA HACK ,[object Object],[object Object],[object Object],[object Object],How it works: QUICK TIP:  Check Google to see if you’re infected -  site:{yourdomain.com} viagra
PHARMA HACK ,[object Object],[object Object],[object Object],[object Object],[object Object],QUICK TIP:  Check Google to see if you’re infected -  site:{yourdomain.com} viagra
WHAT IS SECURITY? PROTECTING THINGS OF VALUE FROM HARM’S WAY.
HOW & WHY
AM I SECURE The percentage of risk can never be 0! The name of the game is minimizing risk.
 
LOCAL MACHINE ,[object Object],[object Object],[object Object],[object Object],[object Object]
CONNECT TO YOUR SITE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORDS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHO HOSTS YOU? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GARAGE CLEANING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BACKUP YOUR WEBSITE ,[object Object],[object Object],[object Object]
MALWARE SCAN ,[object Object],[object Object],[object Object]
MALWARE CLEAN UP ,[object Object],[object Object],[object Object]
WORDPRESS PLUGINS ,[object Object],[object Object],[object Object],[object Object]
 

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Why My Website Sells Viagra

  • 1.  
  • 2.
  • 3.
  • 4.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. ITS NOT ALL PEACHY
  • 11.
  • 12.
  • 13.  
  • 14.
  • 15.
  • 16.
  • 17. ENCODED JAVASCRIPT Impact: Website pages may be used to serve malicious downloads to visitors. Downloads may be used to infect desktop computers, and/or exploit FTP info. Typical Entry Point: Outdated, known vulnerable software; exploited desktop computers; exploited FTP credentials. JavaScript that is obfuscated(hidden) so that you can’t tell what it is. It is injected into files/pages on the site and used to serve malware.
  • 20. ENCODED JAVASCRIPT /wp-admin/js/cat.js – INFECTION DECODED – Somewhat 
  • 21.
  • 22.
  • 23. CONDITIONAL REDIRECTS Impact: When traffic is coming from a specific referrer (i.e. Google, Bing), the site is redirected to a malicious website. Typical Entry Point: Outdated, known vulnerable software. An attack the causes a website to redirect to a malicious website based on referrer, web browser, operating system.
  • 25. CONDITIONAL REDIRECTS Result of conditional redirect:
  • 26.
  • 27.
  • 28. PHARMA HACK Impact: Website page and post titles, descriptions and links are changed to display pharmaceutical ads and links back to malicious websites on search engine result pages. Typical Entry Point: Outdated, known vulnerable software. Pharma Hack is a type of SEO poisoning. Attackers manipulate their search engine results to make their links appear higher than legitimate results.
  • 29. PHARMA HACK Results of scanning rendered source.:
  • 30. PHARMA HACK Google Search Engine Results:
  • 31.
  • 32.
  • 33.
  • 34. WHAT IS SECURITY? PROTECTING THINGS OF VALUE FROM HARM’S WAY.
  • 36. AM I SECURE The percentage of risk can never be 0! The name of the game is minimizing risk.
  • 37.  
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.  

Hinweis der Redaktion

  1. Why My Website Sells Viagra – Don’t Become A Pharmaceutical Marketplace
  2. Click in the text boxes to edit their content.
  3. Click in the text boxes to edit their content.
  4. Click in the text boxes to edit their content.
  5. Click in the text boxes to edit their content.
  6. Click in the text boxes to edit their content.
  7. Click in the text boxes to edit their content.
  8. Click in the text boxes to edit their content.
  9. Click in the text boxes to edit their content.
  10. Click in the text boxes to edit their content.
  11. Click in the text boxes to edit their content.
  12. Click in the text boxes to edit their content.
  13. Click in the text boxes to edit their content.
  14. Click in the text boxes to edit their content.
  15. Click in the text boxes to edit their content.
  16. Click in the text boxes to edit their content.
  17. Click in the text boxes to edit their content.
  18. Click in the text boxes to edit their content.
  19. Click in the text boxes to edit their content.
  20. Click in the text boxes to edit their content.
  21. Click in the text boxes to edit their content.
  22. Click in the text boxes to edit their content.
  23. Click in the text boxes to edit their content.
  24. Click in the text boxes to edit their content.
  25. Click in the text boxes to edit their content.
  26. Click in the text boxes to edit their content.
  27. Click in the text boxes to edit their content.
  28. Click in the text boxes to edit their content.
  29. Click in the text boxes to edit their content.
  30. Click in the text boxes to edit their content.
  31. Click in the text boxes to edit their content.
  32. Click in the text boxes to edit their content.
  33. Click in the text boxes to edit their content.
  34. Click in the text boxes to edit their content.
  35. To edit the smart art: click on it the graphic, you will see a panel to the left where you can add or remove elements. If you do not see the panel open, click on the 2 arrows along the left border of the smart art (this will expand the panel). To change the image: Select the image then right click and select “Format Picture”. Select the “Fill” option, and select a file to replace the image.
  36. Click in the text boxes to edit their content.
  37. Click in the text boxes to edit their content.
  38. Click in the text boxes to edit their content.
  39. Click in the text boxes to edit their content.
  40. Click in the text boxes to edit their content.
  41. Click in the text boxes to edit their content.
  42. Click in the text boxes to edit their content.
  43. Click in the text boxes to edit their content.
  44. Click in the text boxes to edit their content.
  45. Click in the text boxes to edit their content.
  46. Click in the text boxes to edit their content.
  47. Click in the text boxes to edit their content.
  48. To change the phone image: There are 2 grouped images, a transparent phone on top of an image. Select the phone, select the top image and (using your arrow keys) move it over to the left to show the bottom image. Then right click the bottom image and select “Format Picture”. Select the “Fill” option, and select a file to replace the image. Move the phone back into it’s original position.