SlideShare une entreprise Scribd logo
1  sur  61
Télécharger pour lire hors ligne
WordPress Security
Best Practices
Brennen Byrne
@brennenbyrne

Sam Hotchkiss
@hotchkissconsulting
How to make your site
impossible to hack:
Delete it.
This talk is for the rest
of you.
For the next 100 minutes,
we’ll cover the:
5 Rules
• 4 Tools and
• 3 Important Habits
•

To keep your site safe.
Sam Hotchkiss
I run a WordPress agency in Bath, Maine and am the lead
developer for the WordPress security plugin BruteProtect.
Brennen Byrne
I’m one of the founders of Clef, a security plugin for
WordPress that lets you log in without a password.
WordPress Security
Best Practices
Brennen Byrne
@brennenbyrne

Sam Hotchkiss
@hotchkissweb
Slides
getclef.com/wordcamp-security

Checklist
getclef.com/wordpress-security-checklist
Who attacks and why?
it’s not usually because they want to be friends
pharma / affiliate
if you’re not using akismet, you know these well
link injection
SEO hacking at its worst
hacktivists
Syrian Electronic Army, lulzsec, anonops, etc.
drive by download
you’re just the host
redirects
pretty much just hijacking your site
How do they attack?
know your own weaknesses
XSS
cross site scripting: comments or posts that
attack other visitors to your site
CSRF
cross site request forgery: once you’re
authenticated, other sites can pretend to be you
brute force
how many tries does it take to guess
your password?
brute force + botnet
how long does it take an army to guess your
password?
server breach
sites where you log in store your password.
(even though they shouldn’t…)
what happens if they mess up?
bucket brigade
an attacker sits between you and a site you log in to, when
you send your password, they read it before passing it on
but really, insecure
plugins and themes
WordPress core has a team of security experts looking
for these flaws all the time. Most plugins do not.
Do you need to worry?
some people think that their site is too small to be
attacked
WordPress is 20% of
the web
most attackers are counting on a small success
rate across a huge number of sites
Bots attack every site
BruteProtect blocked more than 20m attacks last
year, and it’s on less than 0.01% of WordPress sites
Botnet Economics
one small site infects hundreds of users, who will
help infect more, bigger sites
Now, The Rules
The first rule of WordPress is…
1.
Respect your
passwords
“password” doesn’t cut it anymore
Require strong
passwords
if you use them at all
Don’t email them
to anyone, ever.
Don’t submit them
without SSL on public wifi
or even private wifis that you don’t know that well
2.
respect admin
even if you don’t respect your administrators
keep admin separate
only use it when you need it
change db table
prefix
wp-avoidinghackersallday_users
>
wp_users
make admin
something other than
“admin”
why make things easier?
3.
Sanitize user input
you don’t know where it’s been
do not write your own
SQL
or, if you do, clean it carefully before you use it
validate data before
you display it
avoid running hack.js in your users’ browsers
4.
Disclose Responsibly
and quietly
Tools
not that kind of tool
SFTP
whichever you like
BruteProtect
awesome
Clef
also awesome
Cloak
because WiFi is dangerous
!

(this only works for Mac users)
Important habits
good security hygiene
check for ssl
look for the little lock before typing anything
use different
passwords
more important than using individually strong
ones
!

better yet… don’t use passwords at all
use a password
manager
computers have better memories for this kind of stuff
don’t trust new
senders
.exe and .zip should be feared
educate your clients
it’s your responsibility (and will save you a lot of
headache)
Cleaning up
how do you recover after your site gets
compromised?
first step
change all of your passwords — admin, users,
host, keys, everything you can
save wp-content
copy the folder of your actual content
scan your local
machine
make sure your computer is not infected
burn it with fire
/www, chron, plugins and themes
fresh install
you can restore a backup, save old themes, but
nothing works as well as starting from scratch
re-add wp-content
get back the things you’ve created
last step
change all of your passwords — admin, users,
host, everything you can
Slides
getclef.com/wordcamp-security

Checklist
getclef.com/wordpress-security-checklist
Questions
http://getclef.com/wordpress-security-checklist

Contenu connexe

Plus de jessepollak

Passwords the weakest link in word press security
Passwords  the weakest link in word press securityPasswords  the weakest link in word press security
Passwords the weakest link in word press security
jessepollak
 

Plus de jessepollak (11)

Building Trust on the Blockchain: The Importance of Mental Models
Building Trust on the Blockchain: The Importance of Mental ModelsBuilding Trust on the Blockchain: The Importance of Mental Models
Building Trust on the Blockchain: The Importance of Mental Models
 
Passwords: the weakest link in WordPress security
Passwords: the weakest link in WordPress securityPasswords: the weakest link in WordPress security
Passwords: the weakest link in WordPress security
 
Passwords the weakest link in word press security
Passwords  the weakest link in word press securityPasswords  the weakest link in word press security
Passwords the weakest link in word press security
 
Passwords: the weakest link in WordPress security
Passwords: the weakest link in WordPress securityPasswords: the weakest link in WordPress security
Passwords: the weakest link in WordPress security
 
WordPress Security Update: How we're building the web's most secure platform ...
WordPress Security Update: How we're building the web's most secure platform ...WordPress Security Update: How we're building the web's most secure platform ...
WordPress Security Update: How we're building the web's most secure platform ...
 
Cryptography 101 (with math)
Cryptography 101 (with math)Cryptography 101 (with math)
Cryptography 101 (with math)
 
Cryptography 101
Cryptography 101Cryptography 101
Cryptography 101
 
Passwords: the weakest link in WordPress security
Passwords: the weakest link in WordPress securityPasswords: the weakest link in WordPress security
Passwords: the weakest link in WordPress security
 
Clef security architecture
Clef security architectureClef security architecture
Clef security architecture
 
Passwords and Botnets and Zombies (oh my!)
Passwords and Botnets and Zombies (oh my!)Passwords and Botnets and Zombies (oh my!)
Passwords and Botnets and Zombies (oh my!)
 
Anatomy of a WordPress Hack
Anatomy of a WordPress HackAnatomy of a WordPress Hack
Anatomy of a WordPress Hack
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

WordPress Security Best Practices