SlideShare a Scribd company logo
Avoid Getting Hacked


        Joomla! Web Security
        Northern Virginia Joomla Users Group
        January 2012
        Dorothy Firsching, Ursa Major Consulting, LLC
        dfirsching@ursamajorconsulting.com



1-19-2012             www.ursamajorconsulting.com       1
Agenda
   Discuss Security Considerations and
    Approaches
   Identify Resources and References
   Additional Programs / Presenters?




1-19-2012      www.ursamajorconsulting.com   2
Joomla! Web Security Discussion
   PHP-based / database driven sites are
    vulnerable
           SQL Injections -- Commands where data
            input is expected
           Validate Inputs and Enforce size
           Current version of PHP with appropriate
            settings
           Secure coding practices --
            http://joomladaymidwest.org/news/slides-
            and-video/2011/slides-jeff-channell-
            secure-php-coding-practices.html

1-19-2012             www.ursamajorconsulting.com   3
Pick a Good Host
   Shared Host Vulnerabilities
     http://docs.joomla.org/Security_Checklist_2
      _-_Hosting_and_Server_Setup
     Choose a good hosting provider
                – experienced in Joomla; responsiveness; forums
                / helps
           Appropriate permissions
               Directories = 755
               Files = 644
               .htaccess, configuration.php = 644
           Webserver is set up to use user account as
            owner of PHP-created files

1-19-2012                 www.ursamajorconsulting.com          4
Upgrade Regularly
   Upgrade to Latest Version of Joomla
           Akeeba Admin Tools
   Use Safe Extensions
   Upgrade Extensions
           Check the vulnerability list --
            http://docs.joomla.org/Vulnerable_Extensions_List

           Subscribe to updates
   Keep a spreadsheet of your sites
           And the versions they use

1-19-2012               www.ursamajorconsulting.com       5
Joomla Setup
   Password protect folders in control panel
   Use a site-specific database username and
    password
   Change jos_ table prefix
   Hide Admin login
           jSecure Authentication Plugin
           add a suffix to your back-end URL to make it
            look like this:
            http://www.mysite.com/administrator?199abbetc


1-19-2012              www.ursamajorconsulting.com     6
Access Control
   http://docs.joomla.org/Security_Checklist_4_-_Joomla_Setu
   Strong Passwords
   Change Admin Username and Number
      Default ID for admin user in Joomla is 62, and this
       may be used by a hacker
               Create a new super-administrator with another user
                name and a strong password
               Log out and in again as this new user
               Change original admin user to a manager and save (you
                are not allowed to delete a super-administrator).
               Delete original admin user (user ID 62) and rename
                from the default Admin to a new one.



1-19-2012                  www.ursamajorconsulting.com              7
Backups / Upgrades
   Akeeba Backup
           Remove backups from site
   Multi-backup scheme
   Test restoration / upgrades
           Test site is helpful
   Hosting provider backups
   Hosting provider virus scans or site backup
    using local download / scan
   http://docs.joomla.org/Security_Checklist_6_-_S


1-19-2012                 www.ursamajorconsulting.com   8
Vulnerabilties
   Old Joomla! versions
   Community Builder before 1.7.1
   JCE before 2.0.19
   Unchecked user input (SQL injection,
    buffer overflows)
   eXtplorer left on site
   http://
    docs.joomla.org/Vulnerable_Extensions_L
1-19-2012     www.ursamajorconsulting.com   9
Check What’s Happening
   Logs / AWSTATS / other packages
   Google Analytics
   File Modification Dates / Contents




1-19-2012      www.ursamajorconsulting.com   10
Resources
   http://docs.joomla.org/Category:Security_Check
   http://joomladaymidwest.org/news/slides-and-v

   Securing PHP Web Applications, Tricia
    Ballard and William Ballard, 2009
   Joomla! Web Security, Tom Canavan, Packt
    Publishing, 2008; out-of-date but still
    useful.



1-19-2012       www.ursamajorconsulting.com   11

More Related Content

PPT
Joomla/Mambo CMS
PPT
http://www.slideshare.net/jgarifuna/elgg-presentation-ca-032109
PPT
Joomla Content Management Systems, Part 3
PPTX
Joomla Security v3.0
PPT
Joomla/Mambo CMS
PPT
Drupal security
PDF
Drupal and Security: What You Need to Know
PPTX
Joomla-Content Management System
Joomla/Mambo CMS
http://www.slideshare.net/jgarifuna/elgg-presentation-ca-032109
Joomla Content Management Systems, Part 3
Joomla Security v3.0
Joomla/Mambo CMS
Drupal security
Drupal and Security: What You Need to Know
Joomla-Content Management System

What's hot (7)

PPT
Joomla overview via catchy snaps
PDF
Using advanced features in joomla
PDF
System prereq
DOCX
Rahul Resume.doc
PPT
OWASP Serbia - A5 cross-site request forgery
PDF
Library Management Software
PDF
Aem authentication vs idp
Joomla overview via catchy snaps
Using advanced features in joomla
System prereq
Rahul Resume.doc
OWASP Serbia - A5 cross-site request forgery
Library Management Software
Aem authentication vs idp

Viewers also liked (8)

PPTX
Confoo 2012 - Web security keynote
PPT
Web Services Security - Presentation
ODP
Web Application Firewall
PPT
Web security presentation
PPT
PPTX
Firewall presentation
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPT
Web Security
Confoo 2012 - Web security keynote
Web Services Security - Presentation
Web Application Firewall
Web security presentation
Firewall presentation
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Web Security

Similar to Avoid Getting Hacked! Presentation on Joomla! Web Security (20)

PPTX
Securing Your Joomla website
PPT
Joomla Security
PPT
Joomla Security
PDF
Joomla! security jday2015
PDF
Joomla! security
PPTX
Brendon Hatcher Joomla Security
PPTX
Joomla! security jday2015
ODP
Joomladay Netherlands - Security
PDF
Joomla Security Basics presented by Jeff Mendelson
PDF
Hidden Secrets For A Hack-Proof Joomla! Site
PPTX
Keeping Your Joomla! Site Secure
PPT
Joomladay Switzerland - security
PPTX
Joomla!Day UK 2011 - Virya Technologies - Ruth Cheesley - Joomla! Security
PDF
Making Joomla Insecure - Explaining security by breaking it
PDF
8 Most Popular Joomla Hacks & How To Avoid Them
PDF
8 Most Common Joomla! Hacks and How to Avoid Them
PDF
OWASP Thailand 2016 - Joomla Security
PDF
8 Simple Ways to Hack Your Joomla
PPTX
Joomla spécialiste
PPTX
Joomla! Day Atlanta 2014 - Website Security - The Basics
Securing Your Joomla website
Joomla Security
Joomla Security
Joomla! security jday2015
Joomla! security
Brendon Hatcher Joomla Security
Joomla! security jday2015
Joomladay Netherlands - Security
Joomla Security Basics presented by Jeff Mendelson
Hidden Secrets For A Hack-Proof Joomla! Site
Keeping Your Joomla! Site Secure
Joomladay Switzerland - security
Joomla!Day UK 2011 - Virya Technologies - Ruth Cheesley - Joomla! Security
Making Joomla Insecure - Explaining security by breaking it
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them
OWASP Thailand 2016 - Joomla Security
8 Simple Ways to Hack Your Joomla
Joomla spécialiste
Joomla! Day Atlanta 2014 - Website Security - The Basics

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Machine Learning_overview_presentation.pptx
PDF
Mushroom cultivation and it's methods.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Approach and Philosophy of On baking technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Assigned Numbers - 2025 - Bluetooth® Document
Univ-Connecticut-ChatGPT-Presentaion.pdf
Encapsulation_ Review paper, used for researhc scholars
Machine Learning_overview_presentation.pptx
Mushroom cultivation and it's methods.pdf
cloud_computing_Infrastucture_as_cloud_p
Mobile App Security Testing_ A Comprehensive Guide.pdf
A comparative study of natural language inference in Swahili using monolingua...
Approach and Philosophy of On baking technology
OMC Textile Division Presentation 2021.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)

Avoid Getting Hacked! Presentation on Joomla! Web Security

  • 1. Avoid Getting Hacked Joomla! Web Security Northern Virginia Joomla Users Group January 2012 Dorothy Firsching, Ursa Major Consulting, LLC dfirsching@ursamajorconsulting.com 1-19-2012 www.ursamajorconsulting.com 1
  • 2. Agenda  Discuss Security Considerations and Approaches  Identify Resources and References  Additional Programs / Presenters? 1-19-2012 www.ursamajorconsulting.com 2
  • 3. Joomla! Web Security Discussion  PHP-based / database driven sites are vulnerable  SQL Injections -- Commands where data input is expected  Validate Inputs and Enforce size  Current version of PHP with appropriate settings  Secure coding practices -- http://joomladaymidwest.org/news/slides- and-video/2011/slides-jeff-channell- secure-php-coding-practices.html 1-19-2012 www.ursamajorconsulting.com 3
  • 4. Pick a Good Host  Shared Host Vulnerabilities  http://docs.joomla.org/Security_Checklist_2 _-_Hosting_and_Server_Setup  Choose a good hosting provider  – experienced in Joomla; responsiveness; forums / helps  Appropriate permissions  Directories = 755  Files = 644  .htaccess, configuration.php = 644  Webserver is set up to use user account as owner of PHP-created files 1-19-2012 www.ursamajorconsulting.com 4
  • 5. Upgrade Regularly  Upgrade to Latest Version of Joomla  Akeeba Admin Tools  Use Safe Extensions  Upgrade Extensions  Check the vulnerability list -- http://docs.joomla.org/Vulnerable_Extensions_List  Subscribe to updates  Keep a spreadsheet of your sites  And the versions they use 1-19-2012 www.ursamajorconsulting.com 5
  • 6. Joomla Setup  Password protect folders in control panel  Use a site-specific database username and password  Change jos_ table prefix  Hide Admin login  jSecure Authentication Plugin  add a suffix to your back-end URL to make it look like this: http://www.mysite.com/administrator?199abbetc 1-19-2012 www.ursamajorconsulting.com 6
  • 7. Access Control  http://docs.joomla.org/Security_Checklist_4_-_Joomla_Setu  Strong Passwords  Change Admin Username and Number  Default ID for admin user in Joomla is 62, and this may be used by a hacker  Create a new super-administrator with another user name and a strong password  Log out and in again as this new user  Change original admin user to a manager and save (you are not allowed to delete a super-administrator).  Delete original admin user (user ID 62) and rename from the default Admin to a new one. 1-19-2012 www.ursamajorconsulting.com 7
  • 8. Backups / Upgrades  Akeeba Backup  Remove backups from site  Multi-backup scheme  Test restoration / upgrades  Test site is helpful  Hosting provider backups  Hosting provider virus scans or site backup using local download / scan  http://docs.joomla.org/Security_Checklist_6_-_S 1-19-2012 www.ursamajorconsulting.com 8
  • 9. Vulnerabilties  Old Joomla! versions  Community Builder before 1.7.1  JCE before 2.0.19  Unchecked user input (SQL injection, buffer overflows)  eXtplorer left on site  http:// docs.joomla.org/Vulnerable_Extensions_L 1-19-2012 www.ursamajorconsulting.com 9
  • 10. Check What’s Happening  Logs / AWSTATS / other packages  Google Analytics  File Modification Dates / Contents 1-19-2012 www.ursamajorconsulting.com 10
  • 11. Resources  http://docs.joomla.org/Category:Security_Check  http://joomladaymidwest.org/news/slides-and-v  Securing PHP Web Applications, Tricia Ballard and William Ballard, 2009  Joomla! Web Security, Tom Canavan, Packt Publishing, 2008; out-of-date but still useful. 1-19-2012 www.ursamajorconsulting.com 11