SlideShare una empresa de Scribd logo
1 de 22
Brian Layman
North East Ohio WordPress Meetup
             #NEOWP
   Who I am. What I do. What I see.
   What software do your blogs run on?
   Who here has had a blog hacked, defaced, stolen or
    taken down?
   Is your site safe? (No one would ever want to hack
    my blog about _____.)
   The title is a lie…
•   Twitter             •   PayPal’s Blog
•   Gawker              •   CorneliaMarie.com
•   PhotoMatt           •   ClimateCrisis.net
•   Problogger          •   Twilight Lexicon

            Go Daddy • DreamHost
            Blue Host • Bizland
            Network Solutions
http://bit.ly/AVCampaign
 Content or uploads destroyed
 Hidden hyperlinks added to your site
 Redirect to another site
 Content edited
 Hijacked website
 Defacement
 Bank fraud
 CSRF/XSRF – Cross Site Request Forgery
 XSS – Cross Site Scripting
 SQL Injection
 DDOS – (Distributed) Denial of Service
 DNS Hijacking – Spoofing or Poisoning
 Malvertising – Malicious Advertising
 Stolen Password
 Bad Code
   WordPress
     http://codex.wordpress.org/Hardening_WordPress
     security@wordpress.org
   Drupal
     http://drupal.org/security-team
     security@drupal.org
   Joomla
     http://developer.joomla.org/security.html
     security@joomla.org
  What is it? You tell me…
  Who is right?
  My thought:
    Any steps that may eliminate a large subset of
attacks on your blog should be taken.
   The basics
     Passwords
     Communication (Plain Text vs. SSL)
     Updates
     Watch what you add to your sites
      (plugins/themes/add-ons)
     Backups
     Google Webmaster Tools
   Use strong passwords
   Make them unique in high value situations
   Pay attention to how you are sending your
    passwords
     Wireless Networks = Risk
     FTP – Use SFTP instead
     Email – Use SSL Ports 587,995,993 vs 25,110,143
     Skype – Syncs history upon connect, never send
      secure passwords – EVER
     CPanel/WHM/Admin pages – if it is http not https, your
      password can be scraped
   Keep your blog, plugins, themes, & operating system
    current – yes, even Linux
   Security and attacks improve over time
    2005 – Admin operations required a referrer
    2006 – Admin operations required a NONCE
    2007 – Plugin pages forced to check security
    2008 – Randomized keys and salts & upgrades
    2009 – Security escalations issues – full review
    2010 – Automated plugin and theme upgrades
    2011 – Sniffing, upload, clickjacking, file cleanup
   Every plugin or theme is a security risk
   “Free Theme” sites are a very high risk
   Less popular & highly specialized plugins have had
    less eyes on them and are riskier
   Older plugins used older security standards - we
    simply knew less and had fewer tools
   You are responsible for your site. Learn how to
    identify problems or make a friend who can.
 Both files and database
 Keep the files offline
 If you have files online keep them out of public_html
 As important as having the backups…
   Know how to restore them!
 Before you restore – delete the files and directories
  to remove the hack files
   How do you know you are hacked?
   Google will email you when they consider you a risk
     http://www.google.com/webmasters/
     http://www.google.com/webmasters/checklist/
     https://www.google.com/webmasters/tools/reconsideration
   You can configure multiple owners
   EVERYTHING that is displayed on the screen must
    be filtered.
     WordPress provides: esc_html esc_url esc_*
    http://codex.wordpress.org/Data_Validation
   EVERYTHING that you send to the database must
    be filtered.
     WordPress provides: $wpdb->prepare
   TRUST NOTHING
     Try to use your text instead of user input
   Permissions - The 755 myth
     chmod -R 755 *
     Generic: Directories Should be 755 Files 644
     Reality: The least privileges provides the most access
   VPS vs Shared Hosting vs Managed Hosting
     Flexibility, Access, Less risk = More $
     Harden your own server or let someone do it
     suPHP – Isolates your installation
   Create a “Editor” user for posting
   Create a new “Administrator”, delete the old one,
    then only use it for maintenance
   Never use wp_ as your table prefix
   Look at wp-config-sample.php now and then and
    update your wp-config.php
   Force Secure password logins
     http://codex.wordpress.org/Administration_Over_SSL
 Move wp-config.php
 Remove version Info
 Rename the admin user
 Move your wp-content directory – Possibly worth
  doing but will break many plugins and themes
 Use .htaccess to white list IP addresses or add an
  extra password layer
   Free Plugins
    http://wordpress.org/extend/plugins/
     exploit-scanner
     wp-security-scan
     wordpress-file-monitor
  Paid Plugins
http://pluginbuddy.com/purchase/backupbuddy/
Site Rescue, Securing & Code Review
  Sucuri.net
  WebDevStudios.com
  WebDevStudios.com
  CoveredWebServices.com

 Managed Hosting
  WPEngine.com
  Page.ly
  WPSecuritylock.com

And of course doing it all:
  eHermitsInc.com
http://eHermitsinc.com
http://thecodecave.com
http://www.slideshare.net/brianlayman
http://twitter.com/brianlayman
@eHermits
Text ehermits to 50500
Brian@eHermitsInc.com

Más contenido relacionado

La actualidad más candente

WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and Security
Joe Casabona
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
Thor Kristiansen
 

La actualidad más candente (20)

Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress Troubleshooting
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityWordPress Fav Plugins & Security
WordPress Fav Plugins & Security
 
How to create a WordPress Site
How to create a WordPress Site How to create a WordPress Site
How to create a WordPress Site
 
WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate Workshop
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security Essentials
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Wordpress introduction
Wordpress introductionWordpress introduction
Wordpress introduction
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & Security
 
Coding with jetpack
Coding with jetpackCoding with jetpack
Coding with jetpack
 
Installing and Setting Up WordPress
Installing and Setting Up WordPressInstalling and Setting Up WordPress
Installing and Setting Up WordPress
 
WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and Security
 
Using Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections versionUsing Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections version
 
Why it's not your host's fault
Why it's not your host's faultWhy it's not your host's fault
Why it's not your host's fault
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and security
 

Destacado

Destacado (6)

WordPress 3.8 Beta 1
WordPress 3.8 Beta 1WordPress 3.8 Beta 1
WordPress 3.8 Beta 1
 
Why WordPress?
Why WordPress?Why WordPress?
Why WordPress?
 
WordPress 3.5
WordPress 3.5WordPress 3.5
WordPress 3.5
 
Brethren - What Does It Mean?
Brethren - What Does It Mean?Brethren - What Does It Mean?
Brethren - What Does It Mean?
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being Hacked
 
Unfailing Love
Unfailing LoveUnfailing Love
Unfailing Love
 

Similar a Neo word press meetup ehermits - how to keep your blog from being hacked 2012

WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
Angela Bowman
 
Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013
Think Media Inc.
 

Similar a Neo word press meetup ehermits - how to keep your blog from being hacked 2012 (20)

WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
WordPress Security 101
WordPress Security 101WordPress Security 101
WordPress Security 101
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web Design
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening Steps
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
WordPress security
WordPress securityWordPress security
WordPress security
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Neo word press meetup ehermits - how to keep your blog from being hacked 2012

  • 1. Brian Layman North East Ohio WordPress Meetup #NEOWP
  • 2. Who I am. What I do. What I see.  What software do your blogs run on?  Who here has had a blog hacked, defaced, stolen or taken down?  Is your site safe? (No one would ever want to hack my blog about _____.)  The title is a lie…
  • 3. Twitter • PayPal’s Blog • Gawker • CorneliaMarie.com • PhotoMatt • ClimateCrisis.net • Problogger • Twilight Lexicon  Go Daddy • DreamHost  Blue Host • Bizland  Network Solutions
  • 5.  Content or uploads destroyed  Hidden hyperlinks added to your site  Redirect to another site  Content edited  Hijacked website  Defacement  Bank fraud
  • 6.  CSRF/XSRF – Cross Site Request Forgery  XSS – Cross Site Scripting  SQL Injection  DDOS – (Distributed) Denial of Service  DNS Hijacking – Spoofing or Poisoning  Malvertising – Malicious Advertising  Stolen Password  Bad Code
  • 7. WordPress  http://codex.wordpress.org/Hardening_WordPress  security@wordpress.org  Drupal  http://drupal.org/security-team  security@drupal.org  Joomla  http://developer.joomla.org/security.html  security@joomla.org
  • 8.  What is it? You tell me…  Who is right?  My thought: Any steps that may eliminate a large subset of attacks on your blog should be taken.
  • 9. The basics  Passwords  Communication (Plain Text vs. SSL)  Updates  Watch what you add to your sites (plugins/themes/add-ons)  Backups  Google Webmaster Tools
  • 10. Use strong passwords  Make them unique in high value situations
  • 11. Pay attention to how you are sending your passwords  Wireless Networks = Risk  FTP – Use SFTP instead  Email – Use SSL Ports 587,995,993 vs 25,110,143  Skype – Syncs history upon connect, never send secure passwords – EVER  CPanel/WHM/Admin pages – if it is http not https, your password can be scraped
  • 12. Keep your blog, plugins, themes, & operating system current – yes, even Linux  Security and attacks improve over time 2005 – Admin operations required a referrer 2006 – Admin operations required a NONCE 2007 – Plugin pages forced to check security 2008 – Randomized keys and salts & upgrades 2009 – Security escalations issues – full review 2010 – Automated plugin and theme upgrades 2011 – Sniffing, upload, clickjacking, file cleanup
  • 13. Every plugin or theme is a security risk  “Free Theme” sites are a very high risk  Less popular & highly specialized plugins have had less eyes on them and are riskier  Older plugins used older security standards - we simply knew less and had fewer tools  You are responsible for your site. Learn how to identify problems or make a friend who can.
  • 14.  Both files and database  Keep the files offline  If you have files online keep them out of public_html  As important as having the backups… Know how to restore them!  Before you restore – delete the files and directories to remove the hack files
  • 15. How do you know you are hacked?  Google will email you when they consider you a risk  http://www.google.com/webmasters/  http://www.google.com/webmasters/checklist/  https://www.google.com/webmasters/tools/reconsideration  You can configure multiple owners
  • 16. EVERYTHING that is displayed on the screen must be filtered.  WordPress provides: esc_html esc_url esc_* http://codex.wordpress.org/Data_Validation  EVERYTHING that you send to the database must be filtered.  WordPress provides: $wpdb->prepare  TRUST NOTHING  Try to use your text instead of user input
  • 17. Permissions - The 755 myth  chmod -R 755 *  Generic: Directories Should be 755 Files 644  Reality: The least privileges provides the most access  VPS vs Shared Hosting vs Managed Hosting  Flexibility, Access, Less risk = More $  Harden your own server or let someone do it  suPHP – Isolates your installation
  • 18. Create a “Editor” user for posting  Create a new “Administrator”, delete the old one, then only use it for maintenance  Never use wp_ as your table prefix  Look at wp-config-sample.php now and then and update your wp-config.php  Force Secure password logins  http://codex.wordpress.org/Administration_Over_SSL
  • 19.  Move wp-config.php  Remove version Info  Rename the admin user  Move your wp-content directory – Possibly worth doing but will break many plugins and themes  Use .htaccess to white list IP addresses or add an extra password layer
  • 20. Free Plugins http://wordpress.org/extend/plugins/  exploit-scanner  wp-security-scan  wordpress-file-monitor  Paid Plugins http://pluginbuddy.com/purchase/backupbuddy/
  • 21. Site Rescue, Securing & Code Review  Sucuri.net  WebDevStudios.com  WebDevStudios.com  CoveredWebServices.com Managed Hosting  WPEngine.com  Page.ly  WPSecuritylock.com And of course doing it all:  eHermitsInc.com