SlideShare a Scribd company logo
Wordpress Security 101-202By James F. Ruffer III C|EH1
Bio of a Ethical Hacker:I am always thinking how can I break that?Open source brain and help as many as possible…within reason.2
My wordpress sites 	www.unixbox.orgwww.resolutegames.com < hackedwww.resoluteinteractive.commemphis.issa.orgwww.socialowl.cowww.securityevents.infowww.socialmediasecurity.com3
FireTalk – 3, 2, 1. GO!4
Who is attacking “you”?Kiddie Scripter'sInnocent bystandersEasy targets – inside attacksYou5
Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers. Some more malicious script kiddies have used virus toolkits to create and propagate the Anna Kournikova and Love Bugviruses.[1] Script kiddies lack, or are only developing, coding skills sufficient to understand the effects and side effects of their work. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on. – Wiki Definition KiddieScripters6
Innocent bystanders Wrong place at the wrong time.7
Easy Targets – Inside Attacker8
“You” 9
Why are they attacking you?Kiddie Scripter'sInnocent bystandersEasy targets – inside attacksYou10
Scanned for certain information or pluginsBroadcasting wrong information Testing out tools before attacking real targetIdiots!KiddieScripters11
Innocent bystanders Wrong place at the wrong time.Alabama KKKPorn bloggerCanadian Pills12
Easy Targets – Inside Attacker13
“You” 14
How to preventKiddie Scripter'sInnocent bystandersEasy targets – inside attacksYou15
Keep your site up to dateKeep your plugins up to date / Use reliable / popularKeep your widgets up to date / tested and approvedAdd .htaccess to wp-admin pageRead your hosting status updates “godaddy”Ask for mod_sec to be installed by hosting providerKiddieScripters16
Innocent bystanders DNS – What is it?Whoiswww.yourdomain.com   Go up 2 down 2 Misspelling your names17
Easy Targets – Inside Attacker18
“You” 19
Experts / Hosting on managed serverPermissions and Root Kill blogs4x316x920
All files should be owned by your user account, and should be writable by you. Any file that needs write access from WordPress should be group-owned by the user account used by the web server. / -- the root Wordpress directory: all files should be writable only by your user account.EXCEPT .htaccess if you want WordPress to automatically generate rewrite rules for you/wp-admin/ -- the WordPress administration area: all files should be writable only by your user account./wp-includes/ -- the bulk of WordPress application logic: all files should be writable only by your user account./wp-content/ -- variable user-supplied content: intended by Developers to be completely writable by all (owner/user, group, and public)./wp-content/themes/ -- theme files. If you want to use the built-in theme editor, all files need to be group writable. If you do not want to use the built-in theme editor, all files can be writable only by your user account/wp-content/plugins/ -- plugin files: all files should be writable only by your user account.other directories under /wp-content/ should be documented by whatever plugin / theme requires them. Permissions may vary.File Permissions – Hosting your own21
Error logs		Please customize your error handlers.Check your logs /var/logs/ /apache2 /httpdForce SSL Usage - NoClear TXT!Traffic is keyUse .htaccess To Protect The wp-config File Remove Your WordPress Version Number… Seriously!22
URLs to Help	http://httpd.apache.org/docs/2.2/howto/auth.htmlhttp://www.modsecurity.org/http://wordpress.org/extend/plugins/replace-wp-version/23

More Related Content

PPT
Hack Firefox to steal websecrets
PPT
Internet browser and search engines
ODP
New or obscure web browsers 4x3 (rcsi draft 6)
 
PPT
Sadmind Viruses
ODP
Web Browser Basics, Tips & Tricks Draft 17
 
PDF
Ransomware Trends 2017 & Mitigation Techniques
PPT
Web development resourses
ODP
More Browser Basics, Tips & Tricks 3 Draft 8
 
Hack Firefox to steal websecrets
Internet browser and search engines
New or obscure web browsers 4x3 (rcsi draft 6)
 
Sadmind Viruses
Web Browser Basics, Tips & Tricks Draft 17
 
Ransomware Trends 2017 & Mitigation Techniques
Web development resourses
More Browser Basics, Tips & Tricks 3 Draft 8
 

What's hot (8)

PDF
Techno Savvy Course Presentation
PPTX
Web Browser And Search Engine ! Batra Computer Centre
PPTX
Prevent hacking
PPT
Hacking The World With Flash
ODP
More Browser Basics, Tips & Tricks 2 Draft 17
 
PPTX
Two Step Authentication - Chris La Nauze WordPress meetup presentation
PPTX
Ransomware History and Monitoring Tips
PPT
Malware Goes to the Movies - Briefing
Techno Savvy Course Presentation
Web Browser And Search Engine ! Batra Computer Centre
Prevent hacking
Hacking The World With Flash
More Browser Basics, Tips & Tricks 2 Draft 17
 
Two Step Authentication - Chris La Nauze WordPress meetup presentation
Ransomware History and Monitoring Tips
Malware Goes to the Movies - Briefing
Ad

Viewers also liked (7)

PDF
Web Application Security 101 - 03 Web Security Toolkit
PPTX
Nbt con december-2014-slides
PDF
PDF
Web Application Security 101 - 04 Testing Methodology
PDF
Web Application Security 101 - 06 Authentication
PPTX
Introduction to STIX 101
PPTX
Bug Bounty 101
Web Application Security 101 - 03 Web Security Toolkit
Nbt con december-2014-slides
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 06 Authentication
Introduction to STIX 101
Bug Bounty 101
Ad

Similar to Wordpress security 101 202 (20)

PPTX
WordPress Security Best Practices
PPTX
WordPress security
PPT
Secure All The Things!
PPTX
How To Remove WP-VCD WordPress Malware Attack_.pptx
PDF
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
PPT
ethical-hacking-18092013112412-ethical-hacking.ppt
KEY
Higher Order WordPress Security
PDF
Types of Security Threats WordPress Websites Face: Part-1
PPTX
Simple Ways to Secure and Maintain Your WordPress Website
DOCX
Continuing in your role as a human service provider for your local.docx
PPTX
WordPress Security Best Practices
PDF
WordPress Security Presentation
PDF
WordPress Security Best Practices 2019 Update
PPTX
Wordpress Bug Bounty by Nagendran R.pptx
PPTX
Wordpress Bug Bounty by Nagendran R.pptx
PDF
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
PDF
Computer viruses
PPTX
Securing your WordPress website - New Port Richey WP Meetup
PDF
Dev and Blind - Attacking the weakest Link in IT Security
PDF
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Best Practices
WordPress security
Secure All The Things!
How To Remove WP-VCD WordPress Malware Attack_.pptx
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
ethical-hacking-18092013112412-ethical-hacking.ppt
Higher Order WordPress Security
Types of Security Threats WordPress Websites Face: Part-1
Simple Ways to Secure and Maintain Your WordPress Website
Continuing in your role as a human service provider for your local.docx
WordPress Security Best Practices
WordPress Security Presentation
WordPress Security Best Practices 2019 Update
Wordpress Bug Bounty by Nagendran R.pptx
Wordpress Bug Bounty by Nagendran R.pptx
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer viruses
Securing your WordPress website - New Port Richey WP Meetup
Dev and Blind - Attacking the weakest Link in IT Security
WordPress Security Essentials WordCamp Denver 2012

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Spectroscopy.pptx food analysis technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Tartificialntelligence_presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Getting Started with Data Integration: FME Form 101
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative analysis of optical character recognition models for extracting...
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Tartificialntelligence_presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Getting Started with Data Integration: FME Form 101
MIND Revenue Release Quarter 2 2025 Press Release
A comparative analysis of optical character recognition models for extracting...

Wordpress security 101 202

  • 1. Wordpress Security 101-202By James F. Ruffer III C|EH1
  • 2. Bio of a Ethical Hacker:I am always thinking how can I break that?Open source brain and help as many as possible…within reason.2
  • 3. My wordpress sites www.unixbox.orgwww.resolutegames.com < hackedwww.resoluteinteractive.commemphis.issa.orgwww.socialowl.cowww.securityevents.infowww.socialmediasecurity.com3
  • 4. FireTalk – 3, 2, 1. GO!4
  • 5. Who is attacking “you”?Kiddie Scripter'sInnocent bystandersEasy targets – inside attacksYou5
  • 6. Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers. Some more malicious script kiddies have used virus toolkits to create and propagate the Anna Kournikova and Love Bugviruses.[1] Script kiddies lack, or are only developing, coding skills sufficient to understand the effects and side effects of their work. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on. – Wiki Definition KiddieScripters6
  • 7. Innocent bystanders Wrong place at the wrong time.7
  • 8. Easy Targets – Inside Attacker8
  • 10. Why are they attacking you?Kiddie Scripter'sInnocent bystandersEasy targets – inside attacksYou10
  • 11. Scanned for certain information or pluginsBroadcasting wrong information Testing out tools before attacking real targetIdiots!KiddieScripters11
  • 12. Innocent bystanders Wrong place at the wrong time.Alabama KKKPorn bloggerCanadian Pills12
  • 13. Easy Targets – Inside Attacker13
  • 15. How to preventKiddie Scripter'sInnocent bystandersEasy targets – inside attacksYou15
  • 16. Keep your site up to dateKeep your plugins up to date / Use reliable / popularKeep your widgets up to date / tested and approvedAdd .htaccess to wp-admin pageRead your hosting status updates “godaddy”Ask for mod_sec to be installed by hosting providerKiddieScripters16
  • 17. Innocent bystanders DNS – What is it?Whoiswww.yourdomain.com Go up 2 down 2 Misspelling your names17
  • 18. Easy Targets – Inside Attacker18
  • 20. Experts / Hosting on managed serverPermissions and Root Kill blogs4x316x920
  • 21. All files should be owned by your user account, and should be writable by you. Any file that needs write access from WordPress should be group-owned by the user account used by the web server. / -- the root Wordpress directory: all files should be writable only by your user account.EXCEPT .htaccess if you want WordPress to automatically generate rewrite rules for you/wp-admin/ -- the WordPress administration area: all files should be writable only by your user account./wp-includes/ -- the bulk of WordPress application logic: all files should be writable only by your user account./wp-content/ -- variable user-supplied content: intended by Developers to be completely writable by all (owner/user, group, and public)./wp-content/themes/ -- theme files. If you want to use the built-in theme editor, all files need to be group writable. If you do not want to use the built-in theme editor, all files can be writable only by your user account/wp-content/plugins/ -- plugin files: all files should be writable only by your user account.other directories under /wp-content/ should be documented by whatever plugin / theme requires them. Permissions may vary.File Permissions – Hosting your own21
  • 22. Error logs Please customize your error handlers.Check your logs /var/logs/ /apache2 /httpdForce SSL Usage - NoClear TXT!Traffic is keyUse .htaccess To Protect The wp-config File Remove Your WordPress Version Number… Seriously!22

Editor's Notes

  • #5: I am going to run through this as if you don’t know anything about security per se. At the end I will get into more advanced tools and techniques. Some of this might be common sense but I have to say it so I can tell you I told you so later.