SlideShare ist ein Scribd-Unternehmen logo
1 von 23
What Are the Most
Common Types of Hacks?
Joshua Hammer, Sales Operations Manager
Stephen Johnston, Sales Consultant
S U C U R I W E B I N A R
Joshua Hammer
Sales Operations Manager
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
Joshua Hammer
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
• Sucuri 4 years
• Sales Operations Manager
• Married with 2 kids
• Loves board games, video games, security, and laughing
Stephen Johnston
Sales Consultant
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
Stephen Johnston
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
• Sucuri 1.5 years
• Agency Sales Consultant
• Married with 3 kids
• Loves religion, his family, guitar, technology and security
Tweet #AskSucuri to @SucuriSecurity
In this webinar you will learn:
• How do you define a Hack?
• What are the OWASP Top 10
• What is a back door?
• XSS, SQL Injection, and others.
Tweet #AskSucuri to @SucuriSecurity
What are
hacks?
Before we discuss what the most
common types of hacks are, we
need to decide what a hack is.
Tweet #AskSucuri to @SucuriSecurity
DDoS
• Distributed Denial of Service (DDoS) attacks
are designed to disrupt a website’s availability.
• The objective is to prevent legitimate users
from accessing your website.
• To be successful, the attacker needs to send
more requests than the victim server can
handle. Another way successful attacks occur
is when the attacker sends bogus requests.
Tweet #AskSucuri to @SucuriSecurity
Malware
Generic term used for browser-
side code to create drive-by
downloads.
Tweet #AskSucuri to @SucuriSecurity
Attack
Vectors
An attack vector is the way or
means an attacker tries to gain
access to your digital environment
to infect it with malicious code.
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
Cross-Site
Scripting (XSS)
Reflected XSS
• The application or API includes unvalidated and
unescaped user input as part of HTML output.
Stored XSS
• Application stores user data that is later looked at by
an admin or another user.
DOM XSS
• JavaScript frameworks, single-page applications and
API that dynamically include attacker controllable data.
Tweet #AskSucuri to @SucuriSecurity
Backdoors
• A way back in for the attackers
• Or something built into a program to give
unauthorized access to a system.
In 2018 Website Hack Trend Report, 68% of
malware removed were backdoors it was the
top malware installed during a infection.

Weitere ähnliche Inhalte

Was ist angesagt?

Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri
 
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri
 
Sucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento WebsiteSucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento WebsiteSucuri
 
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri
 
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website TrendsSucuri
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsSucuri
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Sucuri
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri
 
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri
 
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri
 

Was ist angesagt? (20)

Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get HackedSucuri Webinar: How Websites Get Hacked
Sucuri Webinar: How Websites Get Hacked
 
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital Marketers
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
 
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics ReportsSucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
 
Sucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento WebsiteSucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How to Clean a Hacked Magento Website
 
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
 
Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016Sucuri Webinar: Hacked Website Trend Report Q1/2016
Sucuri Webinar: Hacked Website Trend Report Q1/2016
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! website
 
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best Performance
 
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
 

Ähnlich wie What Are the Most Common Types of Hacks?

TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - TrivadisTechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - TrivadisTrivadis
 
Security Webinar: Harden the Heart of Your WordPress SiteSe
Security Webinar: Harden the Heart of Your WordPress SiteSeSecurity Webinar: Harden the Heart of Your WordPress SiteSe
Security Webinar: Harden the Heart of Your WordPress SiteSeWP Engine
 
SANS @Night Talk: SQL Injection Exploited
SANS @Night Talk: SQL Injection ExploitedSANS @Night Talk: SQL Injection Exploited
SANS @Night Talk: SQL Injection ExploitedMicah Hoffman
 
Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Shrutirupa Banerjiee
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
 
Web Vulnerabilities - Building Basic Security Awareness
Web Vulnerabilities - Building Basic Security AwarenessWeb Vulnerabilities - Building Basic Security Awareness
Web Vulnerabilities - Building Basic Security AwarenessGurpreet Luthra
 
Demystifying Web Application Security - JSFoo 2018
Demystifying Web Application Security - JSFoo 2018Demystifying Web Application Security - JSFoo 2018
Demystifying Web Application Security - JSFoo 2018shyamsesh
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The HorizonLalit Kale
 
Attacking Web Applications
Attacking Web ApplicationsAttacking Web Applications
Attacking Web ApplicationsSasha Goldshtein
 
Essential security measures in ASP.NET MVC
Essential security measures in ASP.NET MVC Essential security measures in ASP.NET MVC
Essential security measures in ASP.NET MVC Rafał Hryniewski
 
Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010Security Ninja
 
SQL Injection: How It Works, How to Stop It
SQL Injection: How It Works, How to Stop ItSQL Injection: How It Works, How to Stop It
SQL Injection: How It Works, How to Stop ItGrant Fritchey
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid themKarl Ots
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure WebsiteImperva Incapsula
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a DatabaseJohn Ashmead
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteDeola Kayode
 
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Gareth Davies
 
Attacking Web Applications
Attacking Web ApplicationsAttacking Web Applications
Attacking Web ApplicationsSasha Goldshtein
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 

Ähnlich wie What Are the Most Common Types of Hacks? (20)

TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - TrivadisTechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
 
Security Webinar: Harden the Heart of Your WordPress SiteSe
Security Webinar: Harden the Heart of Your WordPress SiteSeSecurity Webinar: Harden the Heart of Your WordPress SiteSe
Security Webinar: Harden the Heart of Your WordPress SiteSe
 
SANS @Night Talk: SQL Injection Exploited
SANS @Night Talk: SQL Injection ExploitedSANS @Night Talk: SQL Injection Exploited
SANS @Night Talk: SQL Injection Exploited
 
Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
Web Vulnerabilities - Building Basic Security Awareness
Web Vulnerabilities - Building Basic Security AwarenessWeb Vulnerabilities - Building Basic Security Awareness
Web Vulnerabilities - Building Basic Security Awareness
 
Demystifying Web Application Security - JSFoo 2018
Demystifying Web Application Security - JSFoo 2018Demystifying Web Application Security - JSFoo 2018
Demystifying Web Application Security - JSFoo 2018
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 
Attacking Web Applications
Attacking Web ApplicationsAttacking Web Applications
Attacking Web Applications
 
Essential security measures in ASP.NET MVC
Essential security measures in ASP.NET MVC Essential security measures in ASP.NET MVC
Essential security measures in ASP.NET MVC
 
Web security and OWASP
Web security and OWASPWeb security and OWASP
Web security and OWASP
 
Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010
 
SQL Injection: How It Works, How to Stop It
SQL Injection: How It Works, How to Stop ItSQL Injection: How It Works, How to Stop It
SQL Injection: How It Works, How to Stop It
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid them
 
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteJoomla Security Simplified — Seven Easy Steps For a More Secure Website
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press website
 
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016
 
Attacking Web Applications
Attacking Web ApplicationsAttacking Web Applications
Attacking Web Applications
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 

Mehr von Sucuri

Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRSucuri
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebSucuri
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website SecuritySucuri
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaSucuri
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPressSucuri
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Sucuri
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSucuri
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSucuri
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecuritySucuri
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri
 

Mehr von Sucuri (12)

Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & Resiliência
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPress
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus Clientes
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & Security
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
 

Kürzlich hochgeladen

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 

Kürzlich hochgeladen (20)

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

What Are the Most Common Types of Hacks?

  • 1. What Are the Most Common Types of Hacks? Joshua Hammer, Sales Operations Manager Stephen Johnston, Sales Consultant S U C U R I W E B I N A R
  • 2. Joshua Hammer Sales Operations Manager Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R
  • 3. Joshua Hammer Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R • Sucuri 4 years • Sales Operations Manager • Married with 2 kids • Loves board games, video games, security, and laughing
  • 4. Stephen Johnston Sales Consultant Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R
  • 5. Stephen Johnston Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R • Sucuri 1.5 years • Agency Sales Consultant • Married with 3 kids • Loves religion, his family, guitar, technology and security
  • 6. Tweet #AskSucuri to @SucuriSecurity In this webinar you will learn: • How do you define a Hack? • What are the OWASP Top 10 • What is a back door? • XSS, SQL Injection, and others.
  • 7. Tweet #AskSucuri to @SucuriSecurity What are hacks? Before we discuss what the most common types of hacks are, we need to decide what a hack is.
  • 8. Tweet #AskSucuri to @SucuriSecurity DDoS • Distributed Denial of Service (DDoS) attacks are designed to disrupt a website’s availability. • The objective is to prevent legitimate users from accessing your website. • To be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
  • 9. Tweet #AskSucuri to @SucuriSecurity Malware Generic term used for browser- side code to create drive-by downloads.
  • 10. Tweet #AskSucuri to @SucuriSecurity Attack Vectors An attack vector is the way or means an attacker tries to gain access to your digital environment to infect it with malicious code.
  • 11. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 12. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 13. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 14. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 15. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 16. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 17. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 18. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 19. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 20. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 21. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 22. Tweet #AskSucuri to @SucuriSecurity Cross-Site Scripting (XSS) Reflected XSS • The application or API includes unvalidated and unescaped user input as part of HTML output. Stored XSS • Application stores user data that is later looked at by an admin or another user. DOM XSS • JavaScript frameworks, single-page applications and API that dynamically include attacker controllable data.
  • 23. Tweet #AskSucuri to @SucuriSecurity Backdoors • A way back in for the attackers • Or something built into a program to give unauthorized access to a system. In 2018 Website Hack Trend Report, 68% of malware removed were backdoors it was the top malware installed during a infection.

Hinweis der Redaktion

  1. Is an hack a ddos?
  2. Or perhaps its malware
  3. Or maybe its attack vectors
  4. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  5. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  6. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  7. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  8. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  9. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  10. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  11. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  12. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  13. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  14. * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  15. Reflected (allows the attacker to execute html and javascript in the victims browser) Stored(allows attacker to view user input Dom (replace or defacement