SlideShare a Scribd company logo
What Are the Most
Common Types of Hacks?
Joshua Hammer, Sales Operations Manager
Stephen Johnston, Sales Consultant
S U C U R I W E B I N A R
Joshua Hammer
Sales Operations Manager
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
Joshua Hammer
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
• Sucuri 4 years
• Sales Operations Manager
• Married with 2 kids
• Loves board games, video games, security, and laughing
Stephen Johnston
Sales Consultant
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
Stephen Johnston
Tweet #AskSucuri to @SucuriSecurity
W E B I N A R S P E A K E R
• Sucuri 1.5 years
• Agency Sales Consultant
• Married with 3 kids
• Loves religion, his family, guitar, technology and security
Tweet #AskSucuri to @SucuriSecurity
In this webinar you will learn:
• How do you define a Hack?
• What are the OWASP Top 10
• What is a back door?
• XSS, SQL Injection, and others.
Tweet #AskSucuri to @SucuriSecurity
What are
hacks?
Before we discuss what the most
common types of hacks are, we
need to decide what a hack is.
Tweet #AskSucuri to @SucuriSecurity
DDoS
• Distributed Denial of Service (DDoS) attacks
are designed to disrupt a website’s availability.
• The objective is to prevent legitimate users
from accessing your website.
• To be successful, the attacker needs to send
more requests than the victim server can
handle. Another way successful attacks occur
is when the attacker sends bogus requests.
Tweet #AskSucuri to @SucuriSecurity
Malware
Generic term used for browser-
side code to create drive-by
downloads.
Tweet #AskSucuri to @SucuriSecurity
Attack
Vectors
An attack vector is the way or
means an attacker tries to gain
access to your digital environment
to infect it with malicious code.
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
OWASP Top 10
• Injection
• Broken authentication
• Sensitive data exposure
• Xml external entities XXE
• Broken access control
• Security misconfigurations
• Cross site Scripting
• Insecure deserialization
• Using components with known vulnerabilities
• Insufficient logging and monitoring
https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html
https://www.owasp.org/index.php/Main_Page
Tweet #AskSucuri to @SucuriSecurity
Cross-Site
Scripting (XSS)
Reflected XSS
• The application or API includes unvalidated and
unescaped user input as part of HTML output.
Stored XSS
• Application stores user data that is later looked at by
an admin or another user.
DOM XSS
• JavaScript frameworks, single-page applications and
API that dynamically include attacker controllable data.
Tweet #AskSucuri to @SucuriSecurity
Backdoors
• A way back in for the attackers
• Or something built into a program to give
unauthorized access to a system.
In 2018 Website Hack Trend Report, 68% of
malware removed were backdoors it was the
top malware installed during a infection.

More Related Content

PPTX
Sucuri Webinar: Website Security for Web Agencies
PPTX
Sucuri Webinar: What is SEO Spam and How to Fight It
PPTX
Webinar: Personal Online Privacy - Sucuri Security
PPTX
Why Do Hackers Hack?
PPTX
Steps to Keep Your Site Clean
PPTX
Sucuri Webinar: Is SSL enough to secure your website?
PPTX
Sucuri Webinar: Simple Steps To Secure Your Online Store
PPTX
Logs: Understanding Them to Better Manage Your WordPress Site
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: What is SEO Spam and How to Fight It
Webinar: Personal Online Privacy - Sucuri Security
Why Do Hackers Hack?
Steps to Keep Your Site Clean
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Simple Steps To Secure Your Online Store
Logs: Understanding Them to Better Manage Your WordPress Site

What's hot (20)

PDF
Sucuri Webinar: How to clean hacked WordPress sites
PPTX
Sucuri Webinar: How Websites Get Hacked
PPTX
Sucuri Webinar: Website Security Primer for Digital Marketers
PPTX
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
PPTX
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
PDF
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
PPTX
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
PDF
Sucuri Webinar: How to Clean a Hacked Magento Website
PPTX
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
PDF
Sucuri Webinar: Hacked Website Trend Report Q1/2016
PPTX
2018 Hacked Website Trends
PPTX
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
PDF
Sucuri Webinar: Impacts of a website compromise
PPTX
Webinar: CWAF for Mid Market/Enterprise Organizations
PPTX
Kludges and PHP. Why Should You Use a WAF?
PDF
Sucuri Webinar: How to identify and clean a hacked Joomla! website
PPTX
Sucuri Webinar: How to Optimize Your Website for Best Performance
PDF
Sucuri Webinar: Oh No! My Website Has Been Hacked.
PPTX
Sucuri Webinar: Leveraging Sucuri's API
PPTX
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How Websites Get Hacked
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: Defending Your Google Brand Reputation and Analytics Reports
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: How to Clean a Hacked Magento Website
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: Hacked Website Trend Report Q1/2016
2018 Hacked Website Trends
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: Impacts of a website compromise
Webinar: CWAF for Mid Market/Enterprise Organizations
Kludges and PHP. Why Should You Use a WAF?
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Understand and Fix Google Blacklist Warnings

Similar to What Are the Most Common Types of Hacks? (20)

PPTX
owasp features in secure coding techniques
PDF
Secure coding guidelines
PPTX
PPTX
Owasp top 10 vulnerabilities
PPTX
OWASP TOP 10
PPTX
Security risks awareness
PPT
Owasp top 10 & Web vulnerabilities
PPT
OWASP Serbia - A6 security misconfiguration
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
PDF
Truetesters presents OWASP Top 10 Web Vulnerability
PDF
Security Awareness
PDF
Web hackingtools 2015
PDF
Web hackingtools 2015
PDF
Owasp top 10_openwest_2019
PDF
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
ODP
Break it while you make it: writing (more) secure software
PPTX
Word camp orange county 2012 enduser security
PPTX
OWASP Top 10 2021 What's New
PPTX
Essential security measures in ASP.NET MVC
PDF
Web hackingtools cf-summit2014
owasp features in secure coding techniques
Secure coding guidelines
Owasp top 10 vulnerabilities
OWASP TOP 10
Security risks awareness
Owasp top 10 & Web vulnerabilities
OWASP Serbia - A6 security misconfiguration
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
Truetesters presents OWASP Top 10 Web Vulnerability
Security Awareness
Web hackingtools 2015
Web hackingtools 2015
Owasp top 10_openwest_2019
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Break it while you make it: writing (more) secure software
Word camp orange county 2012 enduser security
OWASP Top 10 2021 What's New
Essential security measures in ASP.NET MVC
Web hackingtools cf-summit2014

More from Sucuri (12)

PPTX
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
PPTX
Sucuri Webinar: Getting Started with Sucuri
PPTX
Webinar: eCommerce Compliance - PCI meets GDPR
PPTX
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
PPTX
Ecommerce Website Security
PPTX
Otimização de Websites para Ganho de Performance & Resiliência
PPTX
Guia de Segurança para WordPress
PPTX
Gambiarra e PHP. Por que você deveria usar um WAF?
PPTX
Segurança para Agências: Proteja seus Clientes
PPTX
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
PPTX
WHDusa 2017: Bridging the Divide between Human Behavior & Security
PPTX
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Getting Started with Sucuri
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Ecommerce Website Security
Otimização de Websites para Ganho de Performance & Resiliência
Guia de Segurança para WordPress
Gambiarra e PHP. Por que você deveria usar um WAF?
Segurança para Agências: Proteja seus Clientes
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
WHDusa 2017: Bridging the Divide between Human Behavior & Security
Sucuri Webinar: Beginner's Guide to CDNs

Recently uploaded (20)

PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Testing WebRTC applications at scale.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
innovation process that make everything different.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Introduction to Information and Communication Technology
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Internet___Basics___Styled_ presentation
PPTX
Digital Literacy And Online Safety on internet
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
artificial intelligence overview of it and more
PPTX
Funds Management Learning Material for Beg
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Testing WebRTC applications at scale.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Introuction about ICD -10 and ICD-11 PPT.pptx
tcp ip networks nd ip layering assotred slides
Module 1 - Cyber Law and Ethics 101.pptx
innovation process that make everything different.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Introduction to Information and Communication Technology
Unit-1 introduction to cyber security discuss about how to secure a system
Internet___Basics___Styled_ presentation
Digital Literacy And Online Safety on internet
Cloud-Scale Log Monitoring _ Datadog.pdf
artificial intelligence overview of it and more
Funds Management Learning Material for Beg
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION

What Are the Most Common Types of Hacks?

  • 1. What Are the Most Common Types of Hacks? Joshua Hammer, Sales Operations Manager Stephen Johnston, Sales Consultant S U C U R I W E B I N A R
  • 2. Joshua Hammer Sales Operations Manager Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R
  • 3. Joshua Hammer Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R • Sucuri 4 years • Sales Operations Manager • Married with 2 kids • Loves board games, video games, security, and laughing
  • 4. Stephen Johnston Sales Consultant Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R
  • 5. Stephen Johnston Tweet #AskSucuri to @SucuriSecurity W E B I N A R S P E A K E R • Sucuri 1.5 years • Agency Sales Consultant • Married with 3 kids • Loves religion, his family, guitar, technology and security
  • 6. Tweet #AskSucuri to @SucuriSecurity In this webinar you will learn: • How do you define a Hack? • What are the OWASP Top 10 • What is a back door? • XSS, SQL Injection, and others.
  • 7. Tweet #AskSucuri to @SucuriSecurity What are hacks? Before we discuss what the most common types of hacks are, we need to decide what a hack is.
  • 8. Tweet #AskSucuri to @SucuriSecurity DDoS • Distributed Denial of Service (DDoS) attacks are designed to disrupt a website’s availability. • The objective is to prevent legitimate users from accessing your website. • To be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
  • 9. Tweet #AskSucuri to @SucuriSecurity Malware Generic term used for browser- side code to create drive-by downloads.
  • 10. Tweet #AskSucuri to @SucuriSecurity Attack Vectors An attack vector is the way or means an attacker tries to gain access to your digital environment to infect it with malicious code.
  • 11. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 12. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 13. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 14. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 15. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 16. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 17. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 18. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 19. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 20. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 21. Tweet #AskSucuri to @SucuriSecurity OWASP Top 10 • Injection • Broken authentication • Sensitive data exposure • Xml external entities XXE • Broken access control • Security misconfigurations • Cross site Scripting • Insecure deserialization • Using components with known vulnerabilities • Insufficient logging and monitoring https://blog.sucuri.net/2019/01/owasp-top-10-security-risks-part-v.html https://www.owasp.org/index.php/Main_Page
  • 22. Tweet #AskSucuri to @SucuriSecurity Cross-Site Scripting (XSS) Reflected XSS • The application or API includes unvalidated and unescaped user input as part of HTML output. Stored XSS • Application stores user data that is later looked at by an admin or another user. DOM XSS • JavaScript frameworks, single-page applications and API that dynamically include attacker controllable data.
  • 23. Tweet #AskSucuri to @SucuriSecurity Backdoors • A way back in for the attackers • Or something built into a program to give unauthorized access to a system. In 2018 Website Hack Trend Report, 68% of malware removed were backdoors it was the top malware installed during a infection.

Editor's Notes

  • #9: Is an hack a ddos?
  • #10: Or perhaps its malware
  • #11: Or maybe its attack vectors
  • #12: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #13: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #14: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #15: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #16: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #17: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #18: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #19: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #20: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #21: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #22: * here, we’ll fix the common malware definition * I’ll show you three common ways where malware hides * I’ll try to deobfuscate this magic word little bit And in the end of this webinar I’ll tell you something about… * * So what is malware > Injection (where a hacker trys to inject code such as sql injection attacks) Broken authentication (flaws in authentication or brute force) Sensitvie data exposure (either in transit or stored data) XML External Entities (when either by uploading an xml script or injecting a xml script into axml processor) Broken access control (by gaining access to areas they are not suppose to have access to) Security misconfigurations (not changing defaults for example) Crosssite scripting (will go into more detail on next page) Insecure deserialization (serialization is changing objects to byte strings deserialization is from byte strings to objects (recent attack type was a cookie that stored info as user and was changed to admin in host file thus giving admin access to the site) Known vulnerabilities (using plugins with known issues makes easier target) Insufficient logging and monitoring (cant protect what you don’t know is happing)
  • #23: Reflected (allows the attacker to execute html and javascript in the victims browser) Stored(allows attacker to view user input Dom (replace or defacement