SlideShare a Scribd company logo
10
Most read
11
Most read
12
Most read
SECURING AGAINST ONLINE THREATS
By Armel Nene – Chief Software Architect
• Armel Nene – Founder and Chief Software Architect
• ETAPIX Global – Founded in 2006
• Key focus on Open Source Software implementation
• Over 5 Liferay implementations in the last 3 years
• Experienced from Banking, Digital
  Agencies, Recruitment and Telecom




HACKING LIFERAY - ARMEL NENE                05/03/2013   2
• Introduction
• Operating System Hardening
• Database Security
• Tomcat / Liferay
• Conclusion




HACKING LIFERAY - ARMEL NENE   05/03/2013   3
OS                      Database   Tomcat /
    Hardening                  Security    Liferay



HACKING LIFERAY - ARMEL NENE              05/03/2013   4
HACKING LIFERAY - ARMEL NENE   05/03/2013   5
Here are 5 key points in securing your OS


• Secure all network communication – do not use FTP, Telnet and
  Rlogin
• Disable “ROOT” login – use SUDO to execute root level
  commands
• Install a firewall and block unnecessary ports
• Linux Kernel Hardening ( /etc/sysctl.conf)
• Disabled unwanted services and uninstall unnecessary software



HACKING LIFERAY - ARMEL NENE                       05/03/2013     6
HACKING LIFERAY - ARMEL NENE   05/03/2013   7
Here are some basic MySQL Security best practices


• Set a root password for MySQL
• Remove all anonymous accounts
• Disable non-local root access
• Reload privilege tables to apply changes
• Enable SSL connection, the default connection is
  unencrypted



HACKING LIFERAY - ARMEL NENE                  05/03/2013   8
HACKING LIFERAY - ARMEL NENE   05/03/2013   9
Tomcat has been the most popular application server for
Liferay deployment, based on our projects.
Here is some guidelines for securing Tomcat
• Disable Tomcat shutdown port
• HTTP connectors only to designate IP addresses
• Disable non-local root access
• Configure the “ciphers” attribute used for SSL connections
• Serve all contents through HTTPS



HACKING LIFERAY - ARMEL NENE                   05/03/2013      10
Liferay popularity is rising very fast and many companies are
using it on the open web. On the web, Liferay is vulnerable as
any other web sites.
Here is some guidelines for securing Liferay
• Override all the Admin portlet defaults such user / pass
• Set the preferred protocol to HTTPS
• Secure all tunnel servlet – JSON and Liferay Tunnel
• Secure the Spring Remoting & WebDav Servlets - HTTPS
• Choose a strong password encryption algorithm



HACKING LIFERAY - ARMEL NENE                   05/03/2013        11
When deploying Liferay in production on the Open
Web, attackers can try to gain access:
- Operating System vunerabilities
- SQL vunerabilities
- Tomcat and Liferay ( Web Application) vulnerabilities
Make sure to secure your system if you do not want to be
a victim.



HACKING LIFERAY - ARMEL NENE                05/03/2013     12
HACKING LIFERAY - ARMEL NENE   05/03/2013   13

More Related Content

PPTX
PDF
Hacking Adobe Experience Manager sites
PDF
What Is React | ReactJS Tutorial for Beginners | ReactJS Training | Edureka
PPTX
Ruby on Rails Penetration Testing
PDF
RESTFul development with Apache sling
PDF
Segur digna com img e fotos
PPTX
Introduction to EAD
PPTX
Hadoop vs Java Batch Processing JSR 352
Hacking Adobe Experience Manager sites
What Is React | ReactJS Tutorial for Beginners | ReactJS Training | Edureka
Ruby on Rails Penetration Testing
RESTFul development with Apache sling
Segur digna com img e fotos
Introduction to EAD
Hadoop vs Java Batch Processing JSR 352

Viewers also liked (7)

PDF
How I Hacked Your Wireless LAN � And How to Stop Me
PDF
Design & Develop Batch Applications in Java/JEE
PDF
Three Key Concepts for Understanding JSR-352: Batch Programming for the Java ...
PDF
Java EE 7 Batch processing in the Real World
PDF
Liferay architecture By Navin Agarwal
PDF
Liferay Portal Introduction
PPTX
Liferay Digital Experience (DXP): Redefining customers experience
How I Hacked Your Wireless LAN � And How to Stop Me
Design & Develop Batch Applications in Java/JEE
Three Key Concepts for Understanding JSR-352: Batch Programming for the Java ...
Java EE 7 Batch processing in the Real World
Liferay architecture By Navin Agarwal
Liferay Portal Introduction
Liferay Digital Experience (DXP): Redefining customers experience

Similar to Hacking liferay (20)

PDF
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
PDF
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
PDF
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
PDF
10 Razões para Usar MySQL em Startups
PDF
High Performance Security With SPARC T4 Hardware Assisted Cryptography
PPTX
Eliz seminar
PDF
5 razões estratégicas para usar MySQL
PDF
Troubleshooting Anypoint Platform
PDF
Mysql repos testing.odp
PDF
My sql fabric webinar v1.1
PDF
Alta Disponibilidade no MySQL 5.7
PPTX
MySQL High Availibility Solutions
PDF
AV/DF Advanced Security Option
PPT
MySQL Tech Tour 2015 - 5.7 Connector/J/Net
PPTX
What's new in MySQL Cluster 7.4 webinar charts
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
PPTX
Pegasus Spyware - What You Need to Know
PDF
MySQL cluster 7.4
PDF
pegasus-whatyouneedtoknow-160916194631 (1).pdf
PPT
Solaris11 Desayunos Tecnicos Oracle (Solaris)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
10 Razões para Usar MySQL em Startups
High Performance Security With SPARC T4 Hardware Assisted Cryptography
Eliz seminar
5 razões estratégicas para usar MySQL
Troubleshooting Anypoint Platform
Mysql repos testing.odp
My sql fabric webinar v1.1
Alta Disponibilidade no MySQL 5.7
MySQL High Availibility Solutions
AV/DF Advanced Security Option
MySQL Tech Tour 2015 - 5.7 Connector/J/Net
What's new in MySQL Cluster 7.4 webinar charts
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Pegasus Spyware - What You Need to Know
MySQL cluster 7.4
pegasus-whatyouneedtoknow-160916194631 (1).pdf
Solaris11 Desayunos Tecnicos Oracle (Solaris)

Hacking liferay

  • 1. SECURING AGAINST ONLINE THREATS By Armel Nene – Chief Software Architect
  • 2. • Armel Nene – Founder and Chief Software Architect • ETAPIX Global – Founded in 2006 • Key focus on Open Source Software implementation • Over 5 Liferay implementations in the last 3 years • Experienced from Banking, Digital Agencies, Recruitment and Telecom HACKING LIFERAY - ARMEL NENE 05/03/2013 2
  • 3. • Introduction • Operating System Hardening • Database Security • Tomcat / Liferay • Conclusion HACKING LIFERAY - ARMEL NENE 05/03/2013 3
  • 4. OS Database Tomcat / Hardening Security Liferay HACKING LIFERAY - ARMEL NENE 05/03/2013 4
  • 5. HACKING LIFERAY - ARMEL NENE 05/03/2013 5
  • 6. Here are 5 key points in securing your OS • Secure all network communication – do not use FTP, Telnet and Rlogin • Disable “ROOT” login – use SUDO to execute root level commands • Install a firewall and block unnecessary ports • Linux Kernel Hardening ( /etc/sysctl.conf) • Disabled unwanted services and uninstall unnecessary software HACKING LIFERAY - ARMEL NENE 05/03/2013 6
  • 7. HACKING LIFERAY - ARMEL NENE 05/03/2013 7
  • 8. Here are some basic MySQL Security best practices • Set a root password for MySQL • Remove all anonymous accounts • Disable non-local root access • Reload privilege tables to apply changes • Enable SSL connection, the default connection is unencrypted HACKING LIFERAY - ARMEL NENE 05/03/2013 8
  • 9. HACKING LIFERAY - ARMEL NENE 05/03/2013 9
  • 10. Tomcat has been the most popular application server for Liferay deployment, based on our projects. Here is some guidelines for securing Tomcat • Disable Tomcat shutdown port • HTTP connectors only to designate IP addresses • Disable non-local root access • Configure the “ciphers” attribute used for SSL connections • Serve all contents through HTTPS HACKING LIFERAY - ARMEL NENE 05/03/2013 10
  • 11. Liferay popularity is rising very fast and many companies are using it on the open web. On the web, Liferay is vulnerable as any other web sites. Here is some guidelines for securing Liferay • Override all the Admin portlet defaults such user / pass • Set the preferred protocol to HTTPS • Secure all tunnel servlet – JSON and Liferay Tunnel • Secure the Spring Remoting & WebDav Servlets - HTTPS • Choose a strong password encryption algorithm HACKING LIFERAY - ARMEL NENE 05/03/2013 11
  • 12. When deploying Liferay in production on the Open Web, attackers can try to gain access: - Operating System vunerabilities - SQL vunerabilities - Tomcat and Liferay ( Web Application) vulnerabilities Make sure to secure your system if you do not want to be a victim. HACKING LIFERAY - ARMEL NENE 05/03/2013 12
  • 13. HACKING LIFERAY - ARMEL NENE 05/03/2013 13