SlideShare a Scribd company logo
1 of 15
2 Step
Authentication
For Self Hosted WordPress sites
Chris La Nauze
https://chrislanauze.com/go/2FA-wp-talk-nov-2016/
WPScan Vulnerability Database
To date there are 2407 vulnerabilities.
1305 WordPress Plugins. (54%) of the
vulnerabilities
344 (14.3%) WordPress theme vulnerabilities
758 (31.5%) WordPress core vulnerabilities
https://wpvulndb.com/
Types of Vulnerabilities
The most popular vulnerability types in
WordPress core,
Plugins and Themes are Cross-site
Scripting and SQL Injection.
This is not surprising considering these 2
vulnerabilities have been listed in the
OWASP Top 10 since its inception.
What is Security?
Hardening
Addition of extra layers, to protect the penetration
WordPress - relatively secure platform. If you have
auto updates enabled, auto patch security
vulnerabilities in the core for you. It's only when you
start adding plugins, themes and custom code, the
more chance it has of been hacked, and the more
users you have exponentially increases the risks of
an attack.
Security is like an onion, needs
lots of layers of protection
working together.
Popular WordPress Security Plugins
Ithemes Security
WordFence
BulletProof Security
Securi Security
BBQ - Block Bad Queries
Caveat: They aren’t 100% secure, they are prone to vulnerabilities too. All four
here have been listed in https://wpvulndb.com/search? But being paid services,
they are very quick to patch and fix over free alternatives.
IIs Two Factor Authentication the silver bullet?
No! 2FA is not the silver bullet. It’s just one of the many
layers to help protect your sites.
What is 2 step Authentication?
“Unlike passwords, two-factor authentication (2FA) is a two-step process that asks
for two of three possible factors: things you are, things you have, and things you
know, to prove your identity. Current implementations of two-factor authentication
utilize the something you know (passwords) and something you have/possess
(such as a mobile phone, email account, hardware token, etc.)
WordPress do offer two-factor authentication via free plugins, which offer various
ways to two-factor, including OTP (one-time password) via SMS, phone call, OTP
via email, QR code, authenticators, push notification, and hardware-based key
makers such as Yubikey, SolidPass, etc.”
Ref: http://www.hongkiat.com/blog/wp-plugins-2-factor-authentication/
https://www.google.com.au/landing/2step/
Examples for 2FA in everyday life
● Drawing money from the ATM - card | PIN
● Paying with a credit card - card | signature OR card | PIN OR card | security code
● Entering a foreign country - passport | biometric data
https://twofactorauth.org/
3 Two Factor Authentication Plugins for WordPress
● Duo Security
● Clef
● Google Authenticator
Duo.com
The Steps that happen when
Authenticating with WordPress
1. WordPress connection initiated
2. Primary authentication
3. WordPress connection established
to Duo Security over TCP port 443
4. Secondary authentication via Duo
Security’s service
5. WordPress receives authentication
response
6. WordPress session logged in
https://duo.com/docs/wordpress
Clef
https://getclef.com
Google Authenticator
https://wordpress.org/plugins/
google-authenticator/
Censored For
Security.
2 Step
Authentication
For Self Hosted WordPress sites
Chris La Nauze
https://chrislanauze.com/go/2FA-wp-talk-nov-2016/

More Related Content

What's hot

Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
Steven Cahill
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
drewz lin
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
Shubham Takode
 
Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)
Miguel de la Cruz
 
OWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session managementOWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session management
Nikola Milosevic
 
Web Security Training
Web Security Training Web Security Training
Web Security Training
Tonex
 

What's hot (20)

Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Web Security
Web SecurityWeb Security
Web Security
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)
 
OWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session managementOWASP Serbia - A3 broken authentication and session management
OWASP Serbia - A3 broken authentication and session management
 
Help AG spot light - social engineering
Help AG spot light - social engineeringHelp AG spot light - social engineering
Help AG spot light - social engineering
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
New Insights into Clickjacking
New Insights into ClickjackingNew Insights into Clickjacking
New Insights into Clickjacking
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
Code Signing Certificate
Code Signing CertificateCode Signing Certificate
Code Signing Certificate
 
Web Security Training
Web Security Training Web Security Training
Web Security Training
 
ECrime presentation - A few bits about malware
ECrime presentation - A few bits about malwareECrime presentation - A few bits about malware
ECrime presentation - A few bits about malware
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
 
OWASPTop 10
OWASPTop 10OWASPTop 10
OWASPTop 10
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
Click jacking
Click jackingClick jacking
Click jacking
 

Viewers also liked

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
內壢火車站
內壢火車站內壢火車站
內壢火車站
又瑋 賴
 
Video Techniques and Influences
Video Techniques and InfluencesVideo Techniques and Influences
Video Techniques and Influences
talitha-roberts
 
вычисление площади территории методом триангуляции
вычисление площади территории методом триангуляциивычисление площади территории методом триангуляции
вычисление площади территории методом триангуляции
Светлана Петреченко
 
Key Sequence: Kongen av Bastøy
Key Sequence: Kongen av BastøyKey Sequence: Kongen av Bastøy
Key Sequence: Kongen av Bastøy
talitha-roberts
 
Key Sequence: Kvinden i Buret
Key Sequence: Kvinden i BuretKey Sequence: Kvinden i Buret
Key Sequence: Kvinden i Buret
talitha-roberts
 

Viewers also liked (18)

Does authorship and author rank have an effect on traffic
Does authorship and author rank have an effect on trafficDoes authorship and author rank have an effect on traffic
Does authorship and author rank have an effect on traffic
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
內壢火車站
內壢火車站內壢火車站
內壢火車站
 
Cистема работы методической службы ДСОШ №135
Cистема работы методической службы ДСОШ №135Cистема работы методической службы ДСОШ №135
Cистема работы методической службы ДСОШ №135
 
Group ergonomicsguide
Group ergonomicsguideGroup ergonomicsguide
Group ergonomicsguide
 
7 BELLAS ARTES
7 BELLAS ARTES7 BELLAS ARTES
7 BELLAS ARTES
 
Video Techniques and Influences
Video Techniques and InfluencesVideo Techniques and Influences
Video Techniques and Influences
 
Mrs Wilson's Class
Mrs Wilson's ClassMrs Wilson's Class
Mrs Wilson's Class
 
sinaunang roma
sinaunang romasinaunang roma
sinaunang roma
 
вычисление площади территории методом триангуляции
вычисление площади территории методом триангуляциивычисление площади территории методом триангуляции
вычисление площади территории методом триангуляции
 
Key Sequence: Kongen av Bastøy
Key Sequence: Kongen av BastøyKey Sequence: Kongen av Bastøy
Key Sequence: Kongen av Bastøy
 
Environmental science[3]
Environmental science[3]Environmental science[3]
Environmental science[3]
 
Representation Theory
Representation TheoryRepresentation Theory
Representation Theory
 
Vermont Code Camp 2014 Simple Rover with RaspberryPi
Vermont Code Camp 2014   Simple Rover with RaspberryPiVermont Code Camp 2014   Simple Rover with RaspberryPi
Vermont Code Camp 2014 Simple Rover with RaspberryPi
 
Genre
GenreGenre
Genre
 
Key Sequence: Kvinden i Buret
Key Sequence: Kvinden i BuretKey Sequence: Kvinden i Buret
Key Sequence: Kvinden i Buret
 
Система работы методической службы
Система работы методической службыСистема работы методической службы
Система работы методической службы
 

Similar to Two Step Authentication - Chris La Nauze WordPress meetup presentation

Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
Alexandru Pasaila
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
gilpinleeanna
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 

Similar to Two Step Authentication - Chris La Nauze WordPress meetup presentation (20)

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
 
T04505103106
T04505103106T04505103106
T04505103106
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 

Recently uploaded

💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 

Recently uploaded (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 

Two Step Authentication - Chris La Nauze WordPress meetup presentation

  • 1. 2 Step Authentication For Self Hosted WordPress sites Chris La Nauze https://chrislanauze.com/go/2FA-wp-talk-nov-2016/
  • 2. WPScan Vulnerability Database To date there are 2407 vulnerabilities. 1305 WordPress Plugins. (54%) of the vulnerabilities 344 (14.3%) WordPress theme vulnerabilities 758 (31.5%) WordPress core vulnerabilities https://wpvulndb.com/
  • 3. Types of Vulnerabilities The most popular vulnerability types in WordPress core, Plugins and Themes are Cross-site Scripting and SQL Injection. This is not surprising considering these 2 vulnerabilities have been listed in the OWASP Top 10 since its inception.
  • 4. What is Security? Hardening Addition of extra layers, to protect the penetration WordPress - relatively secure platform. If you have auto updates enabled, auto patch security vulnerabilities in the core for you. It's only when you start adding plugins, themes and custom code, the more chance it has of been hacked, and the more users you have exponentially increases the risks of an attack. Security is like an onion, needs lots of layers of protection working together.
  • 5. Popular WordPress Security Plugins Ithemes Security WordFence BulletProof Security Securi Security BBQ - Block Bad Queries Caveat: They aren’t 100% secure, they are prone to vulnerabilities too. All four here have been listed in https://wpvulndb.com/search? But being paid services, they are very quick to patch and fix over free alternatives.
  • 6. IIs Two Factor Authentication the silver bullet?
  • 7. No! 2FA is not the silver bullet. It’s just one of the many layers to help protect your sites.
  • 8. What is 2 step Authentication? “Unlike passwords, two-factor authentication (2FA) is a two-step process that asks for two of three possible factors: things you are, things you have, and things you know, to prove your identity. Current implementations of two-factor authentication utilize the something you know (passwords) and something you have/possess (such as a mobile phone, email account, hardware token, etc.) WordPress do offer two-factor authentication via free plugins, which offer various ways to two-factor, including OTP (one-time password) via SMS, phone call, OTP via email, QR code, authenticators, push notification, and hardware-based key makers such as Yubikey, SolidPass, etc.” Ref: http://www.hongkiat.com/blog/wp-plugins-2-factor-authentication/
  • 9. https://www.google.com.au/landing/2step/ Examples for 2FA in everyday life ● Drawing money from the ATM - card | PIN ● Paying with a credit card - card | signature OR card | PIN OR card | security code ● Entering a foreign country - passport | biometric data
  • 11. 3 Two Factor Authentication Plugins for WordPress ● Duo Security ● Clef ● Google Authenticator
  • 12. Duo.com The Steps that happen when Authenticating with WordPress 1. WordPress connection initiated 2. Primary authentication 3. WordPress connection established to Duo Security over TCP port 443 4. Secondary authentication via Duo Security’s service 5. WordPress receives authentication response 6. WordPress session logged in https://duo.com/docs/wordpress
  • 15. 2 Step Authentication For Self Hosted WordPress sites Chris La Nauze https://chrislanauze.com/go/2FA-wp-talk-nov-2016/