4. Who is attacking you?
● Kiddy scripters
● Dumbasses
● Angry Hacker
● Professional Hacker
● Team of Hackers
5. Who should you protect yourself
against?
● Kiddy Scripters
● Dumbasses
How and Why?
7. HOW?
Know the most common hacking tools:
https://www.concise-courses.com/hacking-
tools/top-ten/
BackTrack now known as https://www.kali.org/
http://www.metasploit.com/
8. Resources to stay up to date on
OWASP
Data Loss DB
Verizon Report
Hack this site
Root this box
www.owasp.org
www.datalossdb.org
www.verizonenterprise.
com/DBIR/
www.hackthissite.
org/pages/index/index.php
9. Please for the love of God...force some
password rules like uppercase with number
and special char...expire 90 days.
Simple Two Factor solutions
Google Two Factor
Password Rules
11. Copy / Paste will save time BUT...
Using other plugins or others code to save time
is commonly done BUT have you actually
looked at the code? Tested the code?
Open Source code is the worst for exploits.
OAuth plugin
https://github.com/intridea/omniauth