SlideShare a Scribd company logo
1 of 44
Good Afternoon!!!!
My name is
John Parkinson
I live in Eastern Ohio
IT Manager for engineering firm
25 computers
All levels of users
Networking
Repair
Upgrade
Training
Programming (a little)
Jack of all trades
Master of none!
Twitter - @jwparkinson
jwparky@gmail.com
wpknut.com
Please leave feedback!!!
@jwparkinson
#wccbus
Or use hashtag
#tallguywith
grayhairandglassesandapotbelly
WordPress user for 5 years
I am a ‘user’ not an expert!
Personal, work and a club websites.
Also, helped setup 2 other websites
for Belmont County 911 center and
Belmont County Emergency
Management Agency (EMA).
WordCamps in Ohio
How many WordPress beginners?
Dealing With
Lockout
What is a Lockout?
A Lockout happens when a user tries to access a
website with an incorrect username or
password.
After multiple unsuccessful attempts, a user is
Locked Out.
Brute Force Attack
In a brute-force attack, the attacker, or BOT,
tries to enter a system by trying out a series of
username/password combinations to gain
access.
Unlike hacks that focus on vulnerabilities in
software, a Brute Force Attack aims at being the
simplest kind of method to gain access to a site:
it tries usernames and passwords, over and over
again, until it gets in. Often deemed 'inelegant',
they can be very successful when people use
passwords like '123456' and usernames like
'admin.' They are, in short, an attack on the
weakest link in any website's security:
You!
Or in this case……ME!!!!
Reverse brute-force attack
In a reverse brute-force attack, a single (usually
common) password is tested against multiple
usernames or encrypted files. The process may
be repeated for a select few passwords. In such
a strategy, the attacker is generally not targeting
a specific user. Reverse brute-force attacks can
be mitigated by establishing a password policy
that disallows common passwords.
Not to be confused with a
Denial of Service – DoS - attack
A method of attack which involves saturating
the target machine with external
communications requests, so much so that it
cannot respond to legitimate traffic, or responds
so slowly as to be rendered essentially
unavailable. Such attacks usually lead to a server
overload.
In general terms, DoS attacks are implemented
by either forcing the targeted computer(s) to
reset, or consuming its resources so that it can
no longer provide its intended service or
obstructing the communication media between
the intended users and the victim so that they
can no longer communicate adequately.
http://list25.com/25-biggest-cyber-attacks-in-history/1/
WordPress.org has
2,300 Security Plugins
in the Repository
Security Plugins will limit the number
of login attempts and notify the
website owner of a lockout.
All of the Security Plugins
in the world won’t do
you any good
if…….
Look
Familiar?
Login to the
Dashboard – User – Your Profile
And here
It is!
The Fix
Logon to your website host.
Go to File Manager
Go to wp-content/plugins folder
Rename Folder
This disables security plugin
Open new tab then
Login to website and add new user
with administrator privleges.
Log out and then login using new
username & password.
Delete old username
Go back to File Manager
and change the name
of the security plugin back
to original.
Correct Practice
Have root access to your cPanel.
Two users with admin privileges on your
WordPress website.
A user for adding content only.
Use good password practices
No Dictionary Words, Proper Nouns, or Foreign Words
No Personal Information
A strong, effective password requires a necessary
degree of complexity.
• uppercase letters such as A, B, C;
• lowercase letters such as a, b,c;
• numerals such as 1, 2, 3;
• special characters such as $, ?, &; and
• alt characters such as µ, £, Æ.
Password Generators
https://www.grc.com/passwords.htm
https://identitysafe.norton.com/password-
generator
http://www.whatsmyip.org/random-password-
generator/
Questions
or
comments
WordPress TV
2,300 videos from WordCamps all over
the world!
Typical WordCamp
• Let’s say 3 to 4 Tracks
• And 3 sessions each in the morning and
afternoon
• Videos are initially edited by WordCamp
volunteers
• 24 presentation videos to be sent (uploaded)
to WordPress TV
WordPress TV Moderators
• Speaker name
• WordCamp location
• Check for sound and video quality
• Speakers slides
• Presentation description
• Schedule for publication (usually 3 or 4 a day)
The End
Make sure to thank
the organizers, sponsors
and volunteers
Slides can be found at:
http://www.slideshare.net/slideshow/embed_c
ode/34150560
Or type ‘jwparky’ in search box and then ‘user’
Thanks for suffering sitting through
my presentation.
Please leave feedback!!
Enjoy the rest of the sessions!

More Related Content

What's hot

Passwords the weakest link in word press security
Passwords  the weakest link in word press securityPasswords  the weakest link in word press security
Passwords the weakest link in word press security
jessepollak
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
scriptjunkie
 

What's hot (10)

The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
 
Secure Wordpress - 2016[17May - Mashhad]
Secure Wordpress - 2016[17May - Mashhad]Secure Wordpress - 2016[17May - Mashhad]
Secure Wordpress - 2016[17May - Mashhad]
 
Passwords: the weakest link in WordPress security
Passwords: the weakest link in WordPress securityPasswords: the weakest link in WordPress security
Passwords: the weakest link in WordPress security
 
Passwords the weakest link in word press security
Passwords  the weakest link in word press securityPasswords  the weakest link in word press security
Passwords the weakest link in word press security
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana)
 
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 

Viewers also liked

Viewers also liked (8)

2014 WordCamp Columbus Find WordPress Help
2014 WordCamp Columbus Find WordPress Help2014 WordCamp Columbus Find WordPress Help
2014 WordCamp Columbus Find WordPress Help
 
WordCamp Buffalo WPTV
WordCamp Buffalo WPTVWordCamp Buffalo WPTV
WordCamp Buffalo WPTV
 
2014 wcnc find wordpress help
2014 wcnc find wordpress help2014 wcnc find wordpress help
2014 wcnc find wordpress help
 
2014 wcdayton help
2014 wcdayton help2014 wcdayton help
2014 wcdayton help
 
Greater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityGreater Wheeling AITP Web Security
Greater Wheeling AITP Web Security
 
WCCBUS WPTV
WCCBUS WPTVWCCBUS WPTV
WCCBUS WPTV
 
Maglipay kita
Maglipay kitaMaglipay kita
Maglipay kita
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to 2014 WordCamp Columbus - Dealing with a lockout

Web defacement
Web defacementWeb defacement
Web defacement
student
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 

Similar to 2014 WordCamp Columbus - Dealing with a lockout (20)

Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Information on Brute Force Attack
Information on Brute Force AttackInformation on Brute Force Attack
Information on Brute Force Attack
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Intro to Wordpress Security
Intro to Wordpress SecurityIntro to Wordpress Security
Intro to Wordpress Security
 
18 hacking
18 hacking18 hacking
18 hacking
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Types of Security Threats WordPress Websites Face: Part-1
Types of Security Threats WordPress Websites Face: Part-1Types of Security Threats WordPress Websites Face: Part-1
Types of Security Threats WordPress Websites Face: Part-1
 
WordPress Security Guide
WordPress Security GuideWordPress Security Guide
WordPress Security Guide
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
WordPress security
WordPress securityWordPress security
WordPress security
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
 
Be Securious – Hack Your Own Site for Better Security
Be Securious –  Hack Your Own Site for Better SecurityBe Securious –  Hack Your Own Site for Better Security
Be Securious – Hack Your Own Site for Better Security
 
Web defacement
Web defacementWeb defacement
Web defacement
 
WordPress Security Essential Tips & Tricks
WordPress Security Essential Tips & TricksWordPress Security Essential Tips & Tricks
WordPress Security Essential Tips & Tricks
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Is your Wordpress safe enough?
Is your Wordpress safe enough? Is your Wordpress safe enough?
Is your Wordpress safe enough?
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 

Recently uploaded

Recently uploaded (20)

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 

2014 WordCamp Columbus - Dealing with a lockout