SlideShare ist ein Scribd-Unternehmen logo
1 von 22
How to Keep Your Blog
               from Being
            Hacked, Stolen or
            Otherwise Violated
                                   Brian Layman




Exhibits: October 15-16 | Conference: October 14-16 | Mandalay Bay Convention Center | Las Vegas Nevada
Introduction
• Who I am. What I do. What I see.
• What software do your blogs run on?
• Who here has had a blog
  hacked, defaced, stolen or taken down?
• Is your site safe? (No one would ever want to
  hack my blog about _____.)
• The title is a lie…
Well Known Blog Hacks
•   Twitter           •   PayPal’s Blog
•   Gawker            •   CorneliaMarie.com
•   PhotoMatt         •   ClimateCrisis.net
•   Problogger        •   Twilight Lexicon

         • Go Daddy • DreamHost
         • Blue Host • Bizland
         • Network Solutions
Antivirus Campaign




   http://bit.ly/AVCampaign
Define “hacked”
•   Content or uploads destroyed
•   Hidden hyperlinks added to your site
•   Redirect to another site
•   Content edited
•   Hijacked website
•   Defacement
•   Bank fraud
Definition of Terms
     How attacks happen…
•   CSRF/XSRF – Cross Site Request Forgery
•   XSS – Cross Site Scripting
•   SQL Injection
•   DDOS – (Distributed) Denial of Service
•   DNS Hijacking – Spoofing or Poisoning
•   Malvertising – Malicious Advertising
•   Stolen Password
•   Bad Code
Open source Responses to
        Vulnerabilities
• WordPress
  • http://codex.wordpress.org/Hardening_WordPress
  • security@wordpress.org
• Drupal
  • http://drupal.org/security-team
  • security@drupal.org
• Joomla
  • http://developer.joomla.org/security.html
  • security@joomla.org
Security Through Obscurity
• What is it? You tell me…
• Who is right?
• My thought:
   Any steps that may eliminate a large subset
of attacks on your blog should be taken.
Tactics YOU can use no matter
  what platform you are on
• The basics
  • Passwords
  • Communication (Plain Text vs. SSL)
  • Updates
  • Watch what you add to your sites
    (plugins/themes/add-ons)
  • Backups
  • Google Webmaster Tools
Passwords
• Use strong passwords
• Make them unique in high value situations
Communication
• Pay attention to how you are sending your
  passwords
  • Wireless Networks = Risk
  • FTP – Use SFTP instead
  • Email – Use SSL Ports 587,995,993 vs 25,110,143
  • Skype – Syncs history upon connect, never send
    secure passwords – EVER
  • CPanel/WHM/Admin pages – if it is http not
    https, your password can be scraped
Updates
• Keep your blog, plugins, themes, & operating
  system current – yes, even Linux
• Security and attacks improve over time
  2005 – Admin operations required a referrer
  2006 – Admin operations required a NONCE
  2007 – Plugin pages forced to check security
  2008 – Randomized keys and salts & upgrades
  2009 – Security escalations issues – full review
  2010 – Automated plugin and theme upgrades
Watch what you add…
• Every plugin or theme is a security risk
• “Free Theme” sites are a very high risk
• Less popular & highly specialized plugins
  have had less eyes on them and are riskier
• Older plugins used older security standards -
  we simply knew less and had fewer tools
• You are responsible for your site. Learn how
  to identify problems or make a friend who can.
Backups
• Both files and database
• Keep the files offline
• If you have files online keep them out of
  public_html
• As important as having the backups…
    Know how to restore them!
• Before you restore – delete the files and
  directories to remove the hack files
Google Webmaster Tools
• How do you know you are hacked?
• Google will email you when they consider you
  a risk
  • http://www.google.com/webmasters/
  • http://www.google.com/webmasters/checklist/
  • https://www.google.com/webmasters/tools/reconsi
    deration
• You can configure multiple owners
Coding Practices
• EVERYTHING that is displayed on the screen
  must be filtered.
  • WordPress provides: esc_html esc_url esc_*
  http://codex.wordpress.org/Data_Validation
• EVERYTHING that you send to the database
  must be filtered.
  • WordPress provides: $wpdb->prepare
• TRUST NOTHING
  • Try to use your text instead of user input
Servers
• Permissions - The 755 myth
  • chmod -R 755 *
  • Generic: Directories Should be 755 Files 644
  • Reality: The least privileges provides the most
    access
• VPS vs Shared Hosting vs Managed Hosting
  • Flexibility, Access, Less risk = More $
  • Harden your own server or let someone do it
  • suPHP – Isolates your installation
WordPress Specific
     Security Techniques
• Create a “Editor” user for posting
• Create a new “Administrator”, delete the old
  one, then only use it for maintenance
• Never use wp_ as your table prefix
• Look at wp-config-sample.php now and then
  and update your wp-config.php
• Force Secure password logins
  • http://codex.wordpress.org/Administration_Over_SSL
WordPress Techniques
     (Expected Answers)
• Move wp-config.php
• Remove version Info
• Rename the admin user
• Move your wp-content directory – Possibly
  worth doing but will break many plugins and
  themes
• Use .htaccess to white list IP addresses or
  add an extra password layer
WordPress Techniques
• Free Plugins
  http://wordpress.org/extend/plugins/
  • exploit-scanner
  • wp-security-scan
  • wordpress-file-monitor
• Paid Plugins
http://pluginbuddy.com/purchase/backupbuddy/
Who can help?
Managed Hosting & Clean Up
 • iThemes.com
 • Page.ly
 • WPSecuritylock.com
 • WebDevStudios.com
 • CoveredWebServices.com
 And of course:
 • eHermitsInc.com
Brian Layman
http://eHermitsInc.com/slides

http://twitter.com/brianlayman @eHermits
Brian@eHermitsInc.com
Text ehermits to 50500

Weitere ähnliche Inhalte

Was ist angesagt?

WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and Security
Joe Casabona
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
Thor Kristiansen
 

Was ist angesagt? (20)

Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress Troubleshooting
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityWordPress Fav Plugins & Security
WordPress Fav Plugins & Security
 
WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014
 
How to create a WordPress Site
How to create a WordPress Site How to create a WordPress Site
How to create a WordPress Site
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate Workshop
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security Essentials
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Wordpress introduction
Wordpress introductionWordpress introduction
Wordpress introduction
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & Security
 
Coding with jetpack
Coding with jetpackCoding with jetpack
Coding with jetpack
 
Installing and Setting Up WordPress
Installing and Setting Up WordPressInstalling and Setting Up WordPress
Installing and Setting Up WordPress
 
WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and Security
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
Why it's not your host's fault
Why it's not your host's faultWhy it's not your host's fault
Why it's not your host's fault
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and security
 
Using Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections versionUsing Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections version
 

Andere mochten auch (6)

WordPress 3.5
WordPress 3.5WordPress 3.5
WordPress 3.5
 
WordPress 3.8 Beta 1
WordPress 3.8 Beta 1WordPress 3.8 Beta 1
WordPress 3.8 Beta 1
 
Brethren - What Does It Mean?
Brethren - What Does It Mean?Brethren - What Does It Mean?
Brethren - What Does It Mean?
 
Why WordPress?
Why WordPress?Why WordPress?
Why WordPress?
 
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
 
Unfailing Love
Unfailing LoveUnfailing Love
Unfailing Love
 

Ähnlich wie Blog World 2010 - How to Keep Your Blog from Being Hacked

Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Michael Pirnat
 
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFOWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
Brian Huff
 

Ähnlich wie Blog World 2010 - How to Keep Your Blog from Being Hacked (20)

Drupal Security Intro
Drupal Security IntroDrupal Security Intro
Drupal Security Intro
 
Maximizing WordPress
Maximizing WordPressMaximizing WordPress
Maximizing WordPress
 
Securing your web apps now
Securing your web apps nowSecuring your web apps now
Securing your web apps now
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Attacking Drupal
Attacking DrupalAttacking Drupal
Attacking Drupal
 
Do you lose sleep at night?
Do you lose sleep at night?Do you lose sleep at night?
Do you lose sleep at night?
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
 
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) HackableCollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
 
WordPress Setup and Security - WordCamp, Charleston 2014
WordPress Setup and Security - WordCamp, Charleston 2014WordPress Setup and Security - WordCamp, Charleston 2014
WordPress Setup and Security - WordCamp, Charleston 2014
 
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFOWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
 
How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)
 
WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020 WordPress Security 101 - Meetup Nairobi March 2020
WordPress Security 101 - Meetup Nairobi March 2020
 
How WordPress Sites Get Hacked
How WordPress Sites Get HackedHow WordPress Sites Get Hacked
How WordPress Sites Get Hacked
 
Staying Online: Keeping Your Website Safe and Secure
Staying Online: Keeping Your Website Safe and SecureStaying Online: Keeping Your Website Safe and Secure
Staying Online: Keeping Your Website Safe and Secure
 
WordPress Security Basics
WordPress Security BasicsWordPress Security Basics
WordPress Security Basics
 
Doing Drupal security right
Doing Drupal security rightDoing Drupal security right
Doing Drupal security right
 
WCBos13 intermediate workshop
WCBos13 intermediate workshopWCBos13 intermediate workshop
WCBos13 intermediate workshop
 
WordPress Security 101 - WordCamp Nairobi 2019
WordPress Security 101 -  WordCamp Nairobi 2019WordPress Security 101 -  WordCamp Nairobi 2019
WordPress Security 101 - WordCamp Nairobi 2019
 
Website essentials things every library website should have
Website essentials  things every library website should haveWebsite essentials  things every library website should have
Website essentials things every library website should have
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Blog World 2010 - How to Keep Your Blog from Being Hacked

  • 1. How to Keep Your Blog from Being Hacked, Stolen or Otherwise Violated Brian Layman Exhibits: October 15-16 | Conference: October 14-16 | Mandalay Bay Convention Center | Las Vegas Nevada
  • 2. Introduction • Who I am. What I do. What I see. • What software do your blogs run on? • Who here has had a blog hacked, defaced, stolen or taken down? • Is your site safe? (No one would ever want to hack my blog about _____.) • The title is a lie…
  • 3. Well Known Blog Hacks • Twitter • PayPal’s Blog • Gawker • CorneliaMarie.com • PhotoMatt • ClimateCrisis.net • Problogger • Twilight Lexicon • Go Daddy • DreamHost • Blue Host • Bizland • Network Solutions
  • 4. Antivirus Campaign http://bit.ly/AVCampaign
  • 5. Define “hacked” • Content or uploads destroyed • Hidden hyperlinks added to your site • Redirect to another site • Content edited • Hijacked website • Defacement • Bank fraud
  • 6. Definition of Terms How attacks happen… • CSRF/XSRF – Cross Site Request Forgery • XSS – Cross Site Scripting • SQL Injection • DDOS – (Distributed) Denial of Service • DNS Hijacking – Spoofing or Poisoning • Malvertising – Malicious Advertising • Stolen Password • Bad Code
  • 7. Open source Responses to Vulnerabilities • WordPress • http://codex.wordpress.org/Hardening_WordPress • security@wordpress.org • Drupal • http://drupal.org/security-team • security@drupal.org • Joomla • http://developer.joomla.org/security.html • security@joomla.org
  • 8. Security Through Obscurity • What is it? You tell me… • Who is right? • My thought: Any steps that may eliminate a large subset of attacks on your blog should be taken.
  • 9. Tactics YOU can use no matter what platform you are on • The basics • Passwords • Communication (Plain Text vs. SSL) • Updates • Watch what you add to your sites (plugins/themes/add-ons) • Backups • Google Webmaster Tools
  • 10. Passwords • Use strong passwords • Make them unique in high value situations
  • 11. Communication • Pay attention to how you are sending your passwords • Wireless Networks = Risk • FTP – Use SFTP instead • Email – Use SSL Ports 587,995,993 vs 25,110,143 • Skype – Syncs history upon connect, never send secure passwords – EVER • CPanel/WHM/Admin pages – if it is http not https, your password can be scraped
  • 12. Updates • Keep your blog, plugins, themes, & operating system current – yes, even Linux • Security and attacks improve over time 2005 – Admin operations required a referrer 2006 – Admin operations required a NONCE 2007 – Plugin pages forced to check security 2008 – Randomized keys and salts & upgrades 2009 – Security escalations issues – full review 2010 – Automated plugin and theme upgrades
  • 13. Watch what you add… • Every plugin or theme is a security risk • “Free Theme” sites are a very high risk • Less popular & highly specialized plugins have had less eyes on them and are riskier • Older plugins used older security standards - we simply knew less and had fewer tools • You are responsible for your site. Learn how to identify problems or make a friend who can.
  • 14. Backups • Both files and database • Keep the files offline • If you have files online keep them out of public_html • As important as having the backups… Know how to restore them! • Before you restore – delete the files and directories to remove the hack files
  • 15. Google Webmaster Tools • How do you know you are hacked? • Google will email you when they consider you a risk • http://www.google.com/webmasters/ • http://www.google.com/webmasters/checklist/ • https://www.google.com/webmasters/tools/reconsi deration • You can configure multiple owners
  • 16. Coding Practices • EVERYTHING that is displayed on the screen must be filtered. • WordPress provides: esc_html esc_url esc_* http://codex.wordpress.org/Data_Validation • EVERYTHING that you send to the database must be filtered. • WordPress provides: $wpdb->prepare • TRUST NOTHING • Try to use your text instead of user input
  • 17. Servers • Permissions - The 755 myth • chmod -R 755 * • Generic: Directories Should be 755 Files 644 • Reality: The least privileges provides the most access • VPS vs Shared Hosting vs Managed Hosting • Flexibility, Access, Less risk = More $ • Harden your own server or let someone do it • suPHP – Isolates your installation
  • 18. WordPress Specific Security Techniques • Create a “Editor” user for posting • Create a new “Administrator”, delete the old one, then only use it for maintenance • Never use wp_ as your table prefix • Look at wp-config-sample.php now and then and update your wp-config.php • Force Secure password logins • http://codex.wordpress.org/Administration_Over_SSL
  • 19. WordPress Techniques (Expected Answers) • Move wp-config.php • Remove version Info • Rename the admin user • Move your wp-content directory – Possibly worth doing but will break many plugins and themes • Use .htaccess to white list IP addresses or add an extra password layer
  • 20. WordPress Techniques • Free Plugins http://wordpress.org/extend/plugins/ • exploit-scanner • wp-security-scan • wordpress-file-monitor • Paid Plugins http://pluginbuddy.com/purchase/backupbuddy/
  • 21. Who can help? Managed Hosting & Clean Up • iThemes.com • Page.ly • WPSecuritylock.com • WebDevStudios.com • CoveredWebServices.com And of course: • eHermitsInc.com