SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Brian Layman
North East Ohio WordPress Meetup
             #NEOWP
   Who I am. What I do. What I see.
   What software do your blogs run on?
   Who here has had a blog hacked, defaced, stolen or
    taken down?
   Is your site safe? (No one would ever want to hack
    my blog about _____.)
   The title is a lie…
•   Twitter             •   PayPal’s Blog
•   Gawker              •   CorneliaMarie.com
•   PhotoMatt           •   ClimateCrisis.net
•   Problogger          •   Twilight Lexicon

            Go Daddy • DreamHost
            Blue Host • Bizland
            Network Solutions
http://bit.ly/AVCampaign
 Content or uploads destroyed
 Hidden hyperlinks added to your site
 Redirect to another site
 Content edited
 Hijacked website
 Defacement
 Bank fraud
 CSRF/XSRF – Cross Site Request Forgery
 XSS – Cross Site Scripting
 SQL Injection
 DDOS – (Distributed) Denial of Service
 DNS Hijacking – Spoofing or Poisoning
 Malvertising – Malicious Advertising
 Stolen Password
 Bad Code
   WordPress
     http://codex.wordpress.org/Hardening_WordPress
     security@wordpress.org
   Drupal
     http://drupal.org/security-team
     security@drupal.org
   Joomla
     http://developer.joomla.org/security.html
     security@joomla.org
  What is it? You tell me…
  Who is right?
  My thought:
    Any steps that may eliminate a large subset of
attacks on your blog should be taken.
   The basics
     Passwords
     Communication (Plain Text vs. SSL)
     Updates
     Watch what you add to your sites
      (plugins/themes/add-ons)
     Backups
     Google Webmaster Tools
   Use strong passwords
   Make them unique in high value situations
   Pay attention to how you are sending your
    passwords
     Wireless Networks = Risk
     FTP – Use SFTP instead
     Email – Use SSL Ports 587,995,993 vs 25,110,143
     Skype – Syncs history upon connect, never send
      secure passwords – EVER
     CPanel/WHM/Admin pages – if it is http not https, your
      password can be scraped
   Keep your blog, plugins, themes, & operating system
    current – yes, even Linux
   Security and attacks improve over time
    2005 – Admin operations required a referrer
    2006 – Admin operations required a NONCE
    2007 – Plugin pages forced to check security
    2008 – Randomized keys and salts & upgrades
    2009 – Security escalations issues – full review
    2010 – Automated plugin and theme upgrades
    2011 – Sniffing, upload, clickjacking, file cleanup
   Every plugin or theme is a security risk
   “Free Theme” sites are a very high risk
   Less popular & highly specialized plugins have had
    less eyes on them and are riskier
   Older plugins used older security standards - we
    simply knew less and had fewer tools
   You are responsible for your site. Learn how to
    identify problems or make a friend who can.
 Both files and database
 Keep the files offline
 If you have files online keep them out of public_html
 As important as having the backups…
   Know how to restore them!
 Before you restore – delete the files and directories
  to remove the hack files
   How do you know you are hacked?
   Google will email you when they consider you a risk
     http://www.google.com/webmasters/
     http://www.google.com/webmasters/checklist/
     https://www.google.com/webmasters/tools/reconsideration
   You can configure multiple owners
   EVERYTHING that is displayed on the screen must
    be filtered.
     WordPress provides: esc_html esc_url esc_*
    http://codex.wordpress.org/Data_Validation
   EVERYTHING that you send to the database must
    be filtered.
     WordPress provides: $wpdb->prepare
   TRUST NOTHING
     Try to use your text instead of user input
   Permissions - The 755 myth
     chmod -R 755 *
     Generic: Directories Should be 755 Files 644
     Reality: The least privileges provides the most access
   VPS vs Shared Hosting vs Managed Hosting
     Flexibility, Access, Less risk = More $
     Harden your own server or let someone do it
     suPHP – Isolates your installation
   Create a “Editor” user for posting
   Create a new “Administrator”, delete the old one,
    then only use it for maintenance
   Never use wp_ as your table prefix
   Look at wp-config-sample.php now and then and
    update your wp-config.php
   Force Secure password logins
     http://codex.wordpress.org/Administration_Over_SSL
 Move wp-config.php
 Remove version Info
 Rename the admin user
 Move your wp-content directory – Possibly worth
  doing but will break many plugins and themes
 Use .htaccess to white list IP addresses or add an
  extra password layer
   Free Plugins
    http://wordpress.org/extend/plugins/
     exploit-scanner
     wp-security-scan
     wordpress-file-monitor
  Paid Plugins
http://pluginbuddy.com/purchase/backupbuddy/
Site Rescue, Securing & Code Review
  Sucuri.net
  WebDevStudios.com
  WebDevStudios.com
  CoveredWebServices.com

 Managed Hosting
  WPEngine.com
  Page.ly
  WPSecuritylock.com

And of course doing it all:
  eHermitsInc.com
http://eHermitsinc.com
http://thecodecave.com
http://www.slideshare.net/brianlayman
http://twitter.com/brianlayman
@eHermits
Text ehermits to 50500
Brian@eHermitsInc.com

Weitere ähnliche Inhalte

Was ist angesagt?

Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress TroubleshootingTiffany Bridge
 
WordPress Security
WordPress SecurityWordPress Security
WordPress SecurityNathan Platt
 
WordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityWordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityThe Toolbox, Inc.
 
How to create a WordPress Site
How to create a WordPress Site How to create a WordPress Site
How to create a WordPress Site MuhammadUsaid2
 
WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014The Toolbox, Inc.
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate WorkshopThe Toolbox, Inc.
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security EssentialsAngela Bowman
 
WordPress Security
WordPress SecurityWordPress Security
WordPress SecurityIvan Storck
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress websiteSiteGround.com
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityMichelle Davies (Hryvnak)
 
Coding with jetpack
Coding with jetpackCoding with jetpack
Coding with jetpackRich Collier
 
WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and SecurityJoe Casabona
 
Why it's not your host's fault
Why it's not your host's faultWhy it's not your host's fault
Why it's not your host's faultchadmow03
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013Thor Kristiansen
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites Catch Themes
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best PracticesRobert Vidal
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and securityWP Pittsburgh Meetup Group
 

Was ist angesagt? (20)

Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress Troubleshooting
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityWordPress Fav Plugins & Security
WordPress Fav Plugins & Security
 
How to create a WordPress Site
How to create a WordPress Site How to create a WordPress Site
How to create a WordPress Site
 
WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate Workshop
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security Essentials
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Wordpress introduction
Wordpress introductionWordpress introduction
Wordpress introduction
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & Security
 
Coding with jetpack
Coding with jetpackCoding with jetpack
Coding with jetpack
 
Installing and Setting Up WordPress
Installing and Setting Up WordPressInstalling and Setting Up WordPress
Installing and Setting Up WordPress
 
WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and Security
 
Using Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections versionUsing Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections version
 
Why it's not your host's fault
Why it's not your host's faultWhy it's not your host's fault
Why it's not your host's fault
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and security
 

Andere mochten auch

WordPress 3.8 Beta 1
WordPress 3.8 Beta 1WordPress 3.8 Beta 1
WordPress 3.8 Beta 1Brian Layman
 
Brethren - What Does It Mean?
Brethren - What Does It Mean?Brethren - What Does It Mean?
Brethren - What Does It Mean?Brian Layman
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBrian Layman
 

Andere mochten auch (6)

WordPress 3.8 Beta 1
WordPress 3.8 Beta 1WordPress 3.8 Beta 1
WordPress 3.8 Beta 1
 
Why WordPress?
Why WordPress?Why WordPress?
Why WordPress?
 
WordPress 3.5
WordPress 3.5WordPress 3.5
WordPress 3.5
 
Brethren - What Does It Mean?
Brethren - What Does It Mean?Brethren - What Does It Mean?
Brethren - What Does It Mean?
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being Hacked
 
Unfailing Love
Unfailing LoveUnfailing Love
Unfailing Love
 

Ähnlich wie Neo word press meetup ehermits - how to keep your blog from being hacked 2012

WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User SecurityDre Armeda
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012Angela Bowman
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Laskywordcampgc
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)Michael Carnell
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateZero Point Development
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Vasile
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutSiteGround.com
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignJudy Wilson
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014Judy Wilson
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening StepsPlasterdog Web Design
 
Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Think Media Inc.
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!Marko Heijnen
 

Ähnlich wie Neo word press meetup ehermits - how to keep your blog from being hacked 2012 (20)

WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
WordPress Security 101
WordPress Security 101WordPress Security 101
WordPress Security 101
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web Design
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening Steps
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
WordPress security
WordPress securityWordPress security
WordPress security
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
 

Kürzlich hochgeladen

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Kürzlich hochgeladen (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Neo word press meetup ehermits - how to keep your blog from being hacked 2012

  • 1. Brian Layman North East Ohio WordPress Meetup #NEOWP
  • 2. Who I am. What I do. What I see.  What software do your blogs run on?  Who here has had a blog hacked, defaced, stolen or taken down?  Is your site safe? (No one would ever want to hack my blog about _____.)  The title is a lie…
  • 3. Twitter • PayPal’s Blog • Gawker • CorneliaMarie.com • PhotoMatt • ClimateCrisis.net • Problogger • Twilight Lexicon  Go Daddy • DreamHost  Blue Host • Bizland  Network Solutions
  • 5.  Content or uploads destroyed  Hidden hyperlinks added to your site  Redirect to another site  Content edited  Hijacked website  Defacement  Bank fraud
  • 6.  CSRF/XSRF – Cross Site Request Forgery  XSS – Cross Site Scripting  SQL Injection  DDOS – (Distributed) Denial of Service  DNS Hijacking – Spoofing or Poisoning  Malvertising – Malicious Advertising  Stolen Password  Bad Code
  • 7. WordPress  http://codex.wordpress.org/Hardening_WordPress  security@wordpress.org  Drupal  http://drupal.org/security-team  security@drupal.org  Joomla  http://developer.joomla.org/security.html  security@joomla.org
  • 8.  What is it? You tell me…  Who is right?  My thought: Any steps that may eliminate a large subset of attacks on your blog should be taken.
  • 9. The basics  Passwords  Communication (Plain Text vs. SSL)  Updates  Watch what you add to your sites (plugins/themes/add-ons)  Backups  Google Webmaster Tools
  • 10. Use strong passwords  Make them unique in high value situations
  • 11. Pay attention to how you are sending your passwords  Wireless Networks = Risk  FTP – Use SFTP instead  Email – Use SSL Ports 587,995,993 vs 25,110,143  Skype – Syncs history upon connect, never send secure passwords – EVER  CPanel/WHM/Admin pages – if it is http not https, your password can be scraped
  • 12. Keep your blog, plugins, themes, & operating system current – yes, even Linux  Security and attacks improve over time 2005 – Admin operations required a referrer 2006 – Admin operations required a NONCE 2007 – Plugin pages forced to check security 2008 – Randomized keys and salts & upgrades 2009 – Security escalations issues – full review 2010 – Automated plugin and theme upgrades 2011 – Sniffing, upload, clickjacking, file cleanup
  • 13. Every plugin or theme is a security risk  “Free Theme” sites are a very high risk  Less popular & highly specialized plugins have had less eyes on them and are riskier  Older plugins used older security standards - we simply knew less and had fewer tools  You are responsible for your site. Learn how to identify problems or make a friend who can.
  • 14.  Both files and database  Keep the files offline  If you have files online keep them out of public_html  As important as having the backups… Know how to restore them!  Before you restore – delete the files and directories to remove the hack files
  • 15. How do you know you are hacked?  Google will email you when they consider you a risk  http://www.google.com/webmasters/  http://www.google.com/webmasters/checklist/  https://www.google.com/webmasters/tools/reconsideration  You can configure multiple owners
  • 16. EVERYTHING that is displayed on the screen must be filtered.  WordPress provides: esc_html esc_url esc_* http://codex.wordpress.org/Data_Validation  EVERYTHING that you send to the database must be filtered.  WordPress provides: $wpdb->prepare  TRUST NOTHING  Try to use your text instead of user input
  • 17. Permissions - The 755 myth  chmod -R 755 *  Generic: Directories Should be 755 Files 644  Reality: The least privileges provides the most access  VPS vs Shared Hosting vs Managed Hosting  Flexibility, Access, Less risk = More $  Harden your own server or let someone do it  suPHP – Isolates your installation
  • 18. Create a “Editor” user for posting  Create a new “Administrator”, delete the old one, then only use it for maintenance  Never use wp_ as your table prefix  Look at wp-config-sample.php now and then and update your wp-config.php  Force Secure password logins  http://codex.wordpress.org/Administration_Over_SSL
  • 19.  Move wp-config.php  Remove version Info  Rename the admin user  Move your wp-content directory – Possibly worth doing but will break many plugins and themes  Use .htaccess to white list IP addresses or add an extra password layer
  • 20. Free Plugins http://wordpress.org/extend/plugins/  exploit-scanner  wp-security-scan  wordpress-file-monitor  Paid Plugins http://pluginbuddy.com/purchase/backupbuddy/
  • 21. Site Rescue, Securing & Code Review  Sucuri.net  WebDevStudios.com  WebDevStudios.com  CoveredWebServices.com Managed Hosting  WPEngine.com  Page.ly  WPSecuritylock.com And of course doing it all:  eHermitsInc.com