SlideShare a Scribd company logo
p4sSw0rd5:
the weakest link in wordpress security
@brennenbyrne
this talk is about
security
@brennenbyrne
a lot of people think security is
hard
@brennenbyrne
a lot of people think security is
hard
confusing
@brennenbyrne
a lot of people think security is
hard
confusing complicated
@brennenbyrne
a lot of people think security is
hard
confusing complicated
technical
impossible
frustrating
not for you
painful
infuriating
@brennenbyrne
but we all know that it’s
important
@brennenbyrne
but we all know that it’s
important
and my job is to make it
easy
@brennenbyrne
hello, my name is brennen
(@brennenbyrne)
@brennenbyrne
I’m a founder of Clef
(getclef.com)
@brennenbyrne
for the next 30 mins
★ botnets
★ two-factor authentication
★ ssl
★ password rot
★ what you can do
@brennenbyrne
getclef.com/wcmpls2014
getclef.com/wordpress-security-checklist
slides
@brennenbyrne
p4sSw0rd5:
the weakest link in wordpress security
@brennenbyrne
I don’t mean to
scare you —
but there is a zombie
army coming for
your WordPress site.
@brennenbyrne
the old way to break a password
@brennenbyrne
2. guess common passwords
1. virus that watches you type
3. “advanced interrogation”
@brennenbyrne
in order to defend myself
@brennenbyrne
2. limit wrong guesses
1. don’t download viruses
3. don’t anger enemy nation-states
@brennenbyrne
but attackers have gotten smarter
@brennenbyrne
botnets
@brennenbyrne
botnets are what happens to you
when other people download viruses
@brennenbyrne
their computers become
zombies
@brennenbyrne
sites infect visitors’ computers
botnets attack sites
visitors join botnet
bigger botnet attacks more sites
@brennenbyrne
botnets swarm and attack your site
from millions of different computers
@brennenbyrne
2. limit wrong guesses
1. don’t download viruses
3. don’t anger enemy nation-states
@brennenbyrne
botnets are the attackers’ response
to our better defenses
as wordpress becomes a better target
the incentives for breaking it rise
@brennenbyrne
two-factor
@brennenbyrne
something you
@brennenbyrne
the factors
know
something you
something you
@brennenbyrne
the factors
know
have
something you
@brennenbyrne
the factors
know
something you have
something you are
@brennenbyrne
the only thing better
than one factor of
authentication is…
two factors
the old way of doing this meant:
!
1. typing your password
2. getting a text with a bunch of numbers
3. typing in the bunch of numbers
!
(google authenticator)
@brennenbyrne
@brennenbyrne
clef, the plugin i work on, skips
the password to make
two-factor much easier.
ssl
@brennenbyrne
if you want to learn more
about this, go see jesse’s
crypto-101 at 3
@brennenbyrne
@brennenbyrne
for most of us, ssl
might as well stand
for secure symbol lock
it actually stands for “secure socket layer”
without ssl, everything is public
@brennenbyrne
only do stuff you wouldn’t
mind standing on a table
and yelling about in a
coffee shop
i.e. no passwords or credit cards
password
rot
@brennenbyrne
@brennenbyrne
your password is strongest
on the day you set it
@brennenbyrne
your password is strongest
on the day you set it
it gets weaker every day
after that
2. more computer power available
1. more time for attacker to crack
3. greater chance you’ve reused
@brennenbyrne
passwords pit our
memories against
computer brute force —
we are going to lose
@brennenbyrne
what to do
@brennenbyrne
@brennenbyrne
one weird trick to protect
your site from all attacks
@brennenbyrne
delete it.
use two factor for admin
@brennenbyrne
otherwise
install bruteprotect and cloak
read wordpress security checklist
getclef.com/wordpress-security-checklist
getclef.com/wcmpls2014
getclef.com/wordpress-security-checklist
slides
@brennenbyrne

More Related Content

PPT
Chat minklet
PPTX
Cómo usar y exprimir Chrome DevTools #dsm19
PDF
Facebook Privacy: Must do these security settings
PDF
Playin with Password
PDF
An Introduction to WordPress
PPTX
Personal Brand Building with Social Media
PDF
CharlieGeogheganPgDip2014
PPT
Wordpress template hierarchy
Chat minklet
Cómo usar y exprimir Chrome DevTools #dsm19
Facebook Privacy: Must do these security settings
Playin with Password
An Introduction to WordPress
Personal Brand Building with Social Media
CharlieGeogheganPgDip2014
Wordpress template hierarchy

Similar to Passwords: the weakest link in WordPress security (20)

PDF
Passwords: the weakest link in WordPress security
PPTX
Passwords the weakest link in word press security
PDF
Passwords: the weakest link in WordPress security
PDF
Passwords and Botnets and Zombies (oh my!)
PDF
Things that go bump on the web - Web Application Security
PDF
Insecurity-In-Security version.1 (2010)
PDF
Security Theatre - Benelux
PPTX
2014 WordCamp Columbus - Dealing with a lockout
PPTX
How to Secure your WordPress Website - WordCamp UK 2014
PPTX
6 - Web Application Security.pptx
PDF
Security Theatre - AmsterdamPHP
PPTX
Open source security
PDF
Word camp2011 introwordpresssecurity
PDF
2 Factor Authentication for Wordpress
PDF
Ch 6: Attacking Authentication
PPTX
Protect Your WordPress From The Inside Out
PDF
WordPress Security Basics
PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
PDF
WCBham Beginner WordPress Security
PDF
Getting authentication right
Passwords: the weakest link in WordPress security
Passwords the weakest link in word press security
Passwords: the weakest link in WordPress security
Passwords and Botnets and Zombies (oh my!)
Things that go bump on the web - Web Application Security
Insecurity-In-Security version.1 (2010)
Security Theatre - Benelux
2014 WordCamp Columbus - Dealing with a lockout
How to Secure your WordPress Website - WordCamp UK 2014
6 - Web Application Security.pptx
Security Theatre - AmsterdamPHP
Open source security
Word camp2011 introwordpresssecurity
2 Factor Authentication for Wordpress
Ch 6: Attacking Authentication
Protect Your WordPress From The Inside Out
WordPress Security Basics
Secure Coding 101 - OWASP University of Ottawa Workshop
WCBham Beginner WordPress Security
Getting authentication right
Ad

More from jessepollak (6)

PDF
Building Trust on the Blockchain: The Importance of Mental Models
PDF
WordPress Security Update: How we're building the web's most secure platform ...
PDF
Cryptography 101 (with math)
PDF
Cryptography 101
PDF
Clef security architecture
PDF
Anatomy of a WordPress Hack
Building Trust on the Blockchain: The Importance of Mental Models
WordPress Security Update: How we're building the web's most secure platform ...
Cryptography 101 (with math)
Cryptography 101
Clef security architecture
Anatomy of a WordPress Hack
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
Machine Learning_overview_presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Assigned Numbers - 2025 - Bluetooth® Document
SOPHOS-XG Firewall Administrator PPT.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Spectroscopy.pptx food analysis technology
Group 1 Presentation -Planning and Decision Making .pptx

Passwords: the weakest link in WordPress security