SlideShare ist ein Scribd-Unternehmen logo
1 von 22
SECURING WORDPRESS
            Presented by
           Jeff K. Hoffman
   VP of R&D, MyLeadSystemPRO



   http://facebook.com/jeff.k.hoffman
WHY DO HACKERS HACK?


• Easy   SEO

• Malware   Distribution

• Entertainment   & Peer Recognition
HOW DO HACKERS HACK?


• Bots    - like the Google Bot, but Evil.

  • Widely     available, frequently updated.

• Viral   spread
BEFORE YOU BEGIN


• Backup     your site!

• Implement      one tip and test, then another and test, etc.

• If   it’s over your head, just skip it (or, hire help.)
SECURE YOUR SERVER

• Your   blog is only as secure as your Web Host.

• Ifa hacker gets into your hosting account (via FTP, SSH, etc.),
  they win before they even worry about hacking WordPress.

• Use    strong passwords. (StrongPasswordGenerator.com)

• Ask   your Web Host how to best secure your account.
PERMISSIONS

• In   general...

  • Files   should be 644.

  • Folders    should be 755.

• /wp-content/uploads/       should be 775.

• /wp-content/themes/        should be 775 for Theme Editor.
PERMISSIONS


find /path/to/wordpress/ -type f -exec chmod 644 {} ;
find /path/to/wordpress/ -type d -exec chmod 755 {} ;
chmod -R 775 /path/to/wordpress/wp-content/uploads
chmod -R 775 /path/to/wordpress/wp-content/themes
PERMISSIONS
DEFY CONVENTION

• Change   admin username

 • Never    post as admin!

• Move   wp-config.php

• Change   database table prefix**

 • In   wp-config.php

 • In   your database
USE SECRET KEYS

                                                  Edit wp-config.php...
/**#@+
 * Authentication Unique Keys and Salts.
 *
 * Change these to different unique phrases!
 * You can generate these using the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}
 * You can change these at any point in time to invalidate all existing cookies. This will force all users to have to log in again.
 *
 * @since 2.6.0
 */
define('AUTH_KEY',          'put your unique phrase here');
define('SECURE_AUTH_KEY', 'put your unique phrase here');
define('LOGGED_IN_KEY', 'put your unique phrase here');
define('NONCE_KEY',           'put your unique phrase here');
define('AUTH_SALT',          'put your unique phrase here');
define('SECURE_AUTH_SALT', 'put your unique phrase here');
define('LOGGED_IN_SALT', 'put your unique phrase here');
define('NONCE_SALT',           'put your unique phrase here');
CLEAN UP



• After WordPress   is installed, delete /wp-admin/install.php

• Delete   unused/inactive plugins & themes
UPDATE OFTEN


• Always   use the latest version of...

 • WordPress

 • Theme

 • Plugins
MAKE DAILY BACKUPS


• BuyBackupBuddy.com      ($75/year)

• VaultPress.com   ($180/year)

• NOTE: Backups    of a hacked site are ONLY useful for forensics!
STRONG PASSWORD



• StrongPasswordGenerator.com

• 1Password
AVOID DETECTION


• Remove WordPress    Footprints

 • Don’t   use the Meta sidebar widget

 • http://wordpress.org/extend/plugins/secure-wordpress/
MINIMIZE PLUGINS


• Every   plugin you install increases risk

• Popular, widely   used plugins are less risky

• Example: TimThumb
SECURE /WP-ADMIN*

• http://www.cpanel.net/media/tutorials/passwdprotect.htm

• Add   to .htaccess...
     <FilesMatch ".(css|js|jpg|jpeg|gif|png)$">
     Order Allow,Deny
     Allow from All
     Satisfy Any
     </FilesMatch>

     <Files admin-ajax.php>
     Order Allow,Deny
     Allow from All
     Satisfy Any
     </Files>
SECURE /WP-ADMIN



• SSL

   • http://codex.wordpress.org/Administration_Over_SSL
SECURE /WP-INCLUDES*


• Add      this to .htaccess...
 # Block the include-only files.
 RewriteEngine On
 RewriteBase /
 RewriteRule ^wp-admin/includes/ - [F,L]
 RewriteRule !^wp-includes/ - [S=3]
 RewriteRule ^wp-includes/[^/]+.php$ - [F,L]
 RewriteRule ^wp-includes/js/tinymce/langs/.+.php - [F,L]
 RewriteRule ^wp-includes/theme-compat/ - [F,L]
BLOCK ATTACKS



• WordPress   Firewall 2

• Login   Lockdown
MONITORING



• Google Webmaster Tools

• WordPress   File Monitor
Q&A



• http://mlspfanclub.com

Weitere ähnliche Inhalte

Was ist angesagt?

WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityBrad Williams
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutSiteGround.com
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013Thor Kristiansen
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Brad Williams
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Brad Williams
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010Brad Williams
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress SecurityDougal Campbell
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress SecurityShawn Hooper
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security PresentationAndrew Paton
 
WordPress Security Presentation from South Florida WordPress Meetup
WordPress Security Presentation from South Florida WordPress MeetupWordPress Security Presentation from South Florida WordPress Meetup
WordPress Security Presentation from South Florida WordPress MeetupJohn Carcutt
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateZero Point Development
 
WordCamp Finland 2015 - WordPress Security
WordCamp Finland 2015 - WordPress SecurityWordCamp Finland 2015 - WordPress Security
WordCamp Finland 2015 - WordPress SecurityTiia Rantanen
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress websiteSiteGround.com
 
WordPress End-User Security - Orange County WordCamp 2011
WordPress End-User Security - Orange County WordCamp 2011WordPress End-User Security - Orange County WordCamp 2011
WordPress End-User Security - Orange County WordCamp 2011Dre Armeda
 
Wordpress Security Tips
Wordpress Security TipsWordpress Security Tips
Wordpress Security TipsLalit Nama
 
Joomla! on Heroku
Joomla! on HerokuJoomla! on Heroku
Joomla! on HerokuYireo
 
Joomla! security
Joomla! securityJoomla! security
Joomla! securityYireo
 

Was ist angesagt? (20)

WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress Security
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010
 
Google Hacking Basics
Google Hacking BasicsGoogle Hacking Basics
Google Hacking Basics
 
Website security
Website securityWebsite security
Website security
 
Secure All The Things!
Secure All The Things!Secure All The Things!
Secure All The Things!
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress Security
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
WordPress Security Presentation from South Florida WordPress Meetup
WordPress Security Presentation from South Florida WordPress MeetupWordPress Security Presentation from South Florida WordPress Meetup
WordPress Security Presentation from South Florida WordPress Meetup
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
WordCamp Finland 2015 - WordPress Security
WordCamp Finland 2015 - WordPress SecurityWordCamp Finland 2015 - WordPress Security
WordCamp Finland 2015 - WordPress Security
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website
 
WordPress End-User Security - Orange County WordCamp 2011
WordPress End-User Security - Orange County WordCamp 2011WordPress End-User Security - Orange County WordCamp 2011
WordPress End-User Security - Orange County WordCamp 2011
 
Wordpress Security Tips
Wordpress Security TipsWordpress Security Tips
Wordpress Security Tips
 
Joomla! on Heroku
Joomla! on HerokuJoomla! on Heroku
Joomla! on Heroku
 
Joomla! security
Joomla! securityJoomla! security
Joomla! security
 

Andere mochten auch

How2 Start Ocw
How2 Start OcwHow2 Start Ocw
How2 Start OcwTerri Bays
 
Internet Marketing: Conversation marketing
Internet Marketing: Conversation marketingInternet Marketing: Conversation marketing
Internet Marketing: Conversation marketingIan Lurie
 
Collaborating in the Clouds: selecting tools
Collaborating in the Clouds: selecting toolsCollaborating in the Clouds: selecting tools
Collaborating in the Clouds: selecting toolsBobbi Newman
 
2013 Enterprise Strategy Outlook
2013 Enterprise Strategy Outlook2013 Enterprise Strategy Outlook
2013 Enterprise Strategy OutlookMiha Kralj
 
Final Mobile Youth Net Project
Final Mobile Youth Net ProjectFinal Mobile Youth Net Project
Final Mobile Youth Net ProjectRede Jovem
 
The Universe Problem: Poll results, Facebook and the 2012 Presidential campaign
The Universe Problem: Poll results, Facebook and the 2012 Presidential campaignThe Universe Problem: Poll results, Facebook and the 2012 Presidential campaign
The Universe Problem: Poll results, Facebook and the 2012 Presidential campaignIan Lurie
 
Presentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband FundingPresentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband FundingBrian Pinnock
 
This is all such bullshit
This is all such bullshitThis is all such bullshit
This is all such bullshitJason Falls
 
Jeremy Vickers Liquidity Hub
Jeremy Vickers Liquidity HubJeremy Vickers Liquidity Hub
Jeremy Vickers Liquidity Hubdeimos
 
Pod Barcelona Paris
Pod Barcelona ParisPod Barcelona Paris
Pod Barcelona ParisAlexandru S
 
Improving audience engagement in your ILTA 2011 conference sessions
Improving audience engagement in your ILTA 2011 conference sessionsImproving audience engagement in your ILTA 2011 conference sessions
Improving audience engagement in your ILTA 2011 conference sessionsPeter Buck
 
How metrics shape decisions f2psummit
How metrics shape decisions f2psummitHow metrics shape decisions f2psummit
How metrics shape decisions f2psummitPascal Zuta
 
Introducing the Open Container Project
Introducing the Open Container ProjectIntroducing the Open Container Project
Introducing the Open Container ProjectAndrew Kennedy
 
Zookeeper's guide to architecture frameworks
Zookeeper's guide to architecture frameworksZookeeper's guide to architecture frameworks
Zookeeper's guide to architecture frameworksMiha Kralj
 
I can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystem
I can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystemI can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystem
I can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystemSidu Ponnappa
 
Debate a la OAE y a Empresas Públicas de Neiva
Debate a la OAE y a Empresas Públicas de NeivaDebate a la OAE y a Empresas Públicas de Neiva
Debate a la OAE y a Empresas Públicas de NeivaCarlos Mauricio Iriarte
 

Andere mochten auch (20)

How2 Start Ocw
How2 Start OcwHow2 Start Ocw
How2 Start Ocw
 
Internet Marketing: Conversation marketing
Internet Marketing: Conversation marketingInternet Marketing: Conversation marketing
Internet Marketing: Conversation marketing
 
Collaborating in the Clouds: selecting tools
Collaborating in the Clouds: selecting toolsCollaborating in the Clouds: selecting tools
Collaborating in the Clouds: selecting tools
 
2013 Enterprise Strategy Outlook
2013 Enterprise Strategy Outlook2013 Enterprise Strategy Outlook
2013 Enterprise Strategy Outlook
 
Final Mobile Youth Net Project
Final Mobile Youth Net ProjectFinal Mobile Youth Net Project
Final Mobile Youth Net Project
 
Community keynote
Community keynoteCommunity keynote
Community keynote
 
MiT6 - Anne Kustritz
MiT6 - Anne KustritzMiT6 - Anne Kustritz
MiT6 - Anne Kustritz
 
5 Things
5 Things5 Things
5 Things
 
Comercio electrónico en imágenes
Comercio electrónico en imágenesComercio electrónico en imágenes
Comercio electrónico en imágenes
 
The Universe Problem: Poll results, Facebook and the 2012 Presidential campaign
The Universe Problem: Poll results, Facebook and the 2012 Presidential campaignThe Universe Problem: Poll results, Facebook and the 2012 Presidential campaign
The Universe Problem: Poll results, Facebook and the 2012 Presidential campaign
 
Presentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband FundingPresentation to SA National Treasury on National Broadband Funding
Presentation to SA National Treasury on National Broadband Funding
 
This is all such bullshit
This is all such bullshitThis is all such bullshit
This is all such bullshit
 
Jeremy Vickers Liquidity Hub
Jeremy Vickers Liquidity HubJeremy Vickers Liquidity Hub
Jeremy Vickers Liquidity Hub
 
Pod Barcelona Paris
Pod Barcelona ParisPod Barcelona Paris
Pod Barcelona Paris
 
Improving audience engagement in your ILTA 2011 conference sessions
Improving audience engagement in your ILTA 2011 conference sessionsImproving audience engagement in your ILTA 2011 conference sessions
Improving audience engagement in your ILTA 2011 conference sessions
 
How metrics shape decisions f2psummit
How metrics shape decisions f2psummitHow metrics shape decisions f2psummit
How metrics shape decisions f2psummit
 
Introducing the Open Container Project
Introducing the Open Container ProjectIntroducing the Open Container Project
Introducing the Open Container Project
 
Zookeeper's guide to architecture frameworks
Zookeeper's guide to architecture frameworksZookeeper's guide to architecture frameworks
Zookeeper's guide to architecture frameworks
 
I can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystem
I can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystemI can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystem
I can haz HTTP - Consuming and producing HTTP APIs in the Ruby ecosystem
 
Debate a la OAE y a Empresas Públicas de Neiva
Debate a la OAE y a Empresas Públicas de NeivaDebate a la OAE y a Empresas Públicas de Neiva
Debate a la OAE y a Empresas Públicas de Neiva
 

Ähnlich wie Securing WordPress by Jeff Hoffman

Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Think Media Inc.
 
WordPress Plugins and Security
WordPress Plugins and SecurityWordPress Plugins and Security
WordPress Plugins and SecurityThink Media Inc.
 
Securing Your WordPress Installation
Securing Your WordPress InstallationSecuring Your WordPress Installation
Securing Your WordPress InstallationLester Chan
 
WordPress Server Security
WordPress Server SecurityWordPress Server Security
WordPress Server SecurityPeter Baylies
 
Manage WordPress with Awesome using wp cli
Manage WordPress with Awesome using wp cliManage WordPress with Awesome using wp cli
Manage WordPress with Awesome using wp cliGetSource
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and securityWP Pittsburgh Meetup Group
 
WordPress Security - 12 WordPress Security Fundamentals
WordPress Security - 12 WordPress Security FundamentalsWordPress Security - 12 WordPress Security Fundamentals
WordPress Security - 12 WordPress Security Fundamentalsfindingsimple
 
Vagrant WordCamp Hamilton
Vagrant  WordCamp HamiltonVagrant  WordCamp Hamilton
Vagrant WordCamp HamiltonPaul Bearne
 
WordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cli
WordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cliWordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cli
WordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cliGetSource
 
WordPress CLI in-depth
WordPress CLI in-depthWordPress CLI in-depth
WordPress CLI in-depthSanjay Willie
 
Beyond the WordPress 5 minute Install
Beyond the WordPress 5 minute InstallBeyond the WordPress 5 minute Install
Beyond the WordPress 5 minute InstallSteve Taylor
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itTim Plummer
 
Creating Your First WordPress Plugin
Creating Your First WordPress PluginCreating Your First WordPress Plugin
Creating Your First WordPress PluginBrad Williams
 
Word Camp Ph 2009 Word Press In The Wild
Word Camp Ph 2009   Word Press In The WildWord Camp Ph 2009   Word Press In The Wild
Word Camp Ph 2009 Word Press In The Wildrebelpixel
 
WordPress Security
WordPress SecurityWordPress Security
WordPress SecurityNathan Platt
 
Intro to WordPress Plugin Development
Intro to WordPress Plugin DevelopmentIntro to WordPress Plugin Development
Intro to WordPress Plugin DevelopmentBrad Williams
 

Ähnlich wie Securing WordPress by Jeff Hoffman (20)

Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013
 
WordPress Plugins and Security
WordPress Plugins and SecurityWordPress Plugins and Security
WordPress Plugins and Security
 
Securing Your WordPress Installation
Securing Your WordPress InstallationSecuring Your WordPress Installation
Securing Your WordPress Installation
 
Securing your web apps now
Securing your web apps nowSecuring your web apps now
Securing your web apps now
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
WordPress Server Security
WordPress Server SecurityWordPress Server Security
WordPress Server Security
 
Manage WordPress with Awesome using wp cli
Manage WordPress with Awesome using wp cliManage WordPress with Awesome using wp cli
Manage WordPress with Awesome using wp cli
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and security
 
WordPress Security - 12 WordPress Security Fundamentals
WordPress Security - 12 WordPress Security FundamentalsWordPress Security - 12 WordPress Security Fundamentals
WordPress Security - 12 WordPress Security Fundamentals
 
Vagrant WordCamp Hamilton
Vagrant  WordCamp HamiltonVagrant  WordCamp Hamilton
Vagrant WordCamp Hamilton
 
WordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cli
WordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cliWordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cli
WordCamp Vancouver 2012 - Manage WordPress with Awesome using wp-cli
 
WordPress CLI in-depth
WordPress CLI in-depthWordPress CLI in-depth
WordPress CLI in-depth
 
Beyond the WordPress 5 minute Install
Beyond the WordPress 5 minute InstallBeyond the WordPress 5 minute Install
Beyond the WordPress 5 minute Install
 
Seven deadly theming sins
Seven deadly theming sinsSeven deadly theming sins
Seven deadly theming sins
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
 
Creating Your First WordPress Plugin
Creating Your First WordPress PluginCreating Your First WordPress Plugin
Creating Your First WordPress Plugin
 
Word Camp Ph 2009 Word Press In The Wild
Word Camp Ph 2009   Word Press In The WildWord Camp Ph 2009   Word Press In The Wild
Word Camp Ph 2009 Word Press In The Wild
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Intro to WordPress Plugin Development
Intro to WordPress Plugin DevelopmentIntro to WordPress Plugin Development
Intro to WordPress Plugin Development
 

Kürzlich hochgeladen

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Securing WordPress by Jeff Hoffman

  • 1. SECURING WORDPRESS Presented by Jeff K. Hoffman VP of R&D, MyLeadSystemPRO http://facebook.com/jeff.k.hoffman
  • 2. WHY DO HACKERS HACK? • Easy SEO • Malware Distribution • Entertainment & Peer Recognition
  • 3. HOW DO HACKERS HACK? • Bots - like the Google Bot, but Evil. • Widely available, frequently updated. • Viral spread
  • 4. BEFORE YOU BEGIN • Backup your site! • Implement one tip and test, then another and test, etc. • If it’s over your head, just skip it (or, hire help.)
  • 5. SECURE YOUR SERVER • Your blog is only as secure as your Web Host. • Ifa hacker gets into your hosting account (via FTP, SSH, etc.), they win before they even worry about hacking WordPress. • Use strong passwords. (StrongPasswordGenerator.com) • Ask your Web Host how to best secure your account.
  • 6. PERMISSIONS • In general... • Files should be 644. • Folders should be 755. • /wp-content/uploads/ should be 775. • /wp-content/themes/ should be 775 for Theme Editor.
  • 7. PERMISSIONS find /path/to/wordpress/ -type f -exec chmod 644 {} ; find /path/to/wordpress/ -type d -exec chmod 755 {} ; chmod -R 775 /path/to/wordpress/wp-content/uploads chmod -R 775 /path/to/wordpress/wp-content/themes
  • 9. DEFY CONVENTION • Change admin username • Never post as admin! • Move wp-config.php • Change database table prefix** • In wp-config.php • In your database
  • 10. USE SECRET KEYS Edit wp-config.php... /**#@+ * Authentication Unique Keys and Salts. * * Change these to different unique phrases! * You can generate these using the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service} * You can change these at any point in time to invalidate all existing cookies. This will force all users to have to log in again. * * @since 2.6.0 */ define('AUTH_KEY', 'put your unique phrase here'); define('SECURE_AUTH_KEY', 'put your unique phrase here'); define('LOGGED_IN_KEY', 'put your unique phrase here'); define('NONCE_KEY', 'put your unique phrase here'); define('AUTH_SALT', 'put your unique phrase here'); define('SECURE_AUTH_SALT', 'put your unique phrase here'); define('LOGGED_IN_SALT', 'put your unique phrase here'); define('NONCE_SALT', 'put your unique phrase here');
  • 11. CLEAN UP • After WordPress is installed, delete /wp-admin/install.php • Delete unused/inactive plugins & themes
  • 12. UPDATE OFTEN • Always use the latest version of... • WordPress • Theme • Plugins
  • 13. MAKE DAILY BACKUPS • BuyBackupBuddy.com ($75/year) • VaultPress.com ($180/year) • NOTE: Backups of a hacked site are ONLY useful for forensics!
  • 15. AVOID DETECTION • Remove WordPress Footprints • Don’t use the Meta sidebar widget • http://wordpress.org/extend/plugins/secure-wordpress/
  • 16. MINIMIZE PLUGINS • Every plugin you install increases risk • Popular, widely used plugins are less risky • Example: TimThumb
  • 17. SECURE /WP-ADMIN* • http://www.cpanel.net/media/tutorials/passwdprotect.htm • Add to .htaccess... <FilesMatch ".(css|js|jpg|jpeg|gif|png)$"> Order Allow,Deny Allow from All Satisfy Any </FilesMatch> <Files admin-ajax.php> Order Allow,Deny Allow from All Satisfy Any </Files>
  • 18. SECURE /WP-ADMIN • SSL • http://codex.wordpress.org/Administration_Over_SSL
  • 19. SECURE /WP-INCLUDES* • Add this to .htaccess... # Block the include-only files. RewriteEngine On RewriteBase / RewriteRule ^wp-admin/includes/ - [F,L] RewriteRule !^wp-includes/ - [S=3] RewriteRule ^wp-includes/[^/]+.php$ - [F,L] RewriteRule ^wp-includes/js/tinymce/langs/.+.php - [F,L] RewriteRule ^wp-includes/theme-compat/ - [F,L]
  • 20. BLOCK ATTACKS • WordPress Firewall 2 • Login Lockdown
  • 21. MONITORING • Google Webmaster Tools • WordPress File Monitor

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n