SlideShare a Scribd company logo
1 of 75
Download to read offline
Identifying a Compromised
WordPress Site
@chrisburgess #wpmelb
Prevention is the holy grail,
however it’s not the topic of this
talk.
You can’t always prevent, so
you must detect.
Even if we’re doing everything
possible to harden and maintain our
installations, we should still care
about security to monitor our high
value sites.
Is Penetration Testing Worth it?
There are two reasons why you might want to conduct a
penetration test.
One, you want to know whether a certain vulnerability is
present because you're going to fix it if it is. And two, you need
a big, scary report to persuade your boss to spend more
money. If neither is true, I'm going to save you a lot of money
by giving you this free penetration test: You're vulnerable.
Now, go do something useful about it.
-- Bruce Schneier
http://www.schneier.com/blog/archives/2007/05/is_penetration.html
The following examples are
often the first signs of a
successful attack.
Ahrefs and Google Search Console
Real example of anchor text from Ahrefs
Real example of a malicious plugin.
Real example of a malicious plugin.
This shouldn’t be the first sign
of a compromised site. There
are usually plenty of early
warning signs.
But first…
Links to the Quora Article
•  https://www.quora.com/I-am-powering-a-
banks-website-using-WordPress-What-
security-measures-should-I-take
•  https://ma.tt/2015/04/a-bank-website-on-
wordpress/
•  https://wptavern.com/banking-on-wordpress-
matt-mullenweg-weighs-in-on-security-
concerns
h"ps://www.quora.com/I-am-powering-a-banks-website-using-WordPress-What-security-
measures-should-I-take/answer/Karol-Krol?srid=uD68
Let’s ask another question. Is Linux
secure? Is Django secure? Is iOS
secure? Is MySQL secure? Is Drupal
secure? Is Node.JS secure? Is
<insert browser> secure? Is
Android secure? Is Rails secure? Is
Windows Server secure? Is Shopify
secure? You get the idea…
This can get subjective, since some have a
much better track record than others, and
some are designed with security as a priority.
So.. banks aside, what would
constitute as a high value
target?
High traffic sites, anything with
Personally Identifiable
Information (PII), software
vendors, service providers?
Credit card numbers aren’t the
only form of sensitive
information.
It’s really easy to say
“something isn’t secure”.
It’s much harder to actually
build something that is secure
(knowing that there’s no such
thing as absolute security).
The best answer is that if
security is important, you need
“people” working on it.
The Internet is a hostile
environment. We need to have
a healthy respect for this fact.
The current dilemma…
Hosting Providers
Plugins
Systems and Services
Users
Good Developers
Good Support, Ops and
SysAdmins
A high value business needs
good people, from all of these
disciplines, working together.
h"p://www.sentrillion.com/images/img_defense-in-depth.jpg
Real example of a malicious file
You can’t rely only on tools, they
won’t always detect a
compromise.
Most WordPress security tools
work by using signatures.
For context, Kaspersky AV for
Windows currently has around
500,000 signatures.
Scanning your site with online
tools work only if your site has
active malware, is defaced or
blacklisted.
If a site has been compromised,
it cannot be trusted.
example.com/index.php
example.com/otherapp/
example.com/*
example.com/*
Isolation
Look out for a shared web root, addon
domains in cPanel, or other web apps in
subfolders.
We’re going to assume a fresh
WordPress install, or restoration
from a clean backup is needed
Places/things to check…
•  Content/files (htaccess, index.php, sitemap.xml, anything
custom)
•  Running processes
•  Running scripts, open files (look at full paths in processes)
•  Memory
•  Cron jobs
•  Database
•  Date and timestamps
•  Suspicious plugins
•  Suspicious directories/files
•  Sitemaps/SERPs
•  WordPress Admin Users
•  Other users in GSC/WMT
•  Code audit
Checking Content
•  grep
•  Screaming Frog (useful for finding JS)
•  Sucuri SiteCheck
•  UnmaskParasites.com
•  Safe Browsing Site Status (Google)
Once the server has been
compromised, it cannot be
trusted.
Tools for Detection
•  System Monitoring
•  Integrity Monitoring
•  Firewalls
•  IDS/IPS
•  Malware Scanners
•  Logging
System Monitoring
•  Resources (Bandwidth/CPU/RAM/IO)
•  Logins
•  Processes
Integrity Monitoring
•  git
•  wp-cli
•  Any diff tools
•  Plugins
•  Tripwire (and similar)
wp-cli’s Verify Checksums
$ wp core verify-checksums
Success: WordPress install verifies against
checksums.
Thanks	to	@davemac	for	this	Kp!
Firewalls
•  Network Firewalls
•  Web Application Firewalls
•  Security Services
IDS/IPS
•  Typically at the host level
•  OSSEC
Malware Detection
•  Security Plugins
•  Commercial AV
•  Public Site Scanning
•  Google Search Console
•  ConfigServer eXpliot Scanner (for WHM/
cPanel)
•  Maldet/ClamAV
Logging
•  /var/log (access, error, php)
•  Centralised Logging or Log Shipping
(Papertrail, Loggly, Splunk, Logstash etc.)
•  Audit trails (Stream/WP Audit Trail etc.)
WPScan WordPress Scanner
WPSecurityBloggers.com
Use a security plugin
(or manually harden)
https://www.wordfence.com/
https://sucuri.net/
https://ithemes.com/security/
Final Words…
Security issues typically occur because of
certain patterns. Cleaning, restoring or
rebuilding doesn’t address that.
Compromised sites are much more likely to
become compromised again. Get everyone
on board to take security seriously.
Prevention and Response
Hardening/Prevention:
•  https://codex.wordpress.org/
Hardening_WordPress
Post-hack/Response:
•  https://sucuri.net/website-security/what-
to-do-after-a-website-hack/
•  WordPress.org
– wordpress.org/about/security
– wordpress.org/news/category/security
•  Verizon DBIR
http://www.verizonenterprise.com/
•  verizon-insights-lab/dbir/
•  Sucuri https://sucuri.net/
•  WP White Security
https://www.wpwhitesecurity.com/
•  OWASP http://owasp.org/
wpmelb.org/slack
Thanks and stay safe!
@chrisburgess #wpmelb

More Related Content

What's hot

Installing WordPress The Right Way
Installing WordPress The Right WayInstalling WordPress The Right Way
Installing WordPress The Right WayChris Burgess
 
Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress TroubleshootingTiffany Bridge
 
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri
 
Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016
Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016
Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016Peter Mead
 
40 of the Most Popular WordPress Plugins
40 of the Most Popular WordPress Plugins40 of the Most Popular WordPress Plugins
40 of the Most Popular WordPress PluginsChris Burgess
 
What I learned about SEO (while building a WordPress Theme)
What I learned about SEO (while building a WordPress Theme)What I learned about SEO (while building a WordPress Theme)
What I learned about SEO (while building a WordPress Theme)David Zimmerman
 
Managing WordPress
Managing WordPressManaging WordPress
Managing WordPressSteven Watts
 
Introduction to SEO and SEO for WordPress
Introduction to SEO and SEO for WordPressIntroduction to SEO and SEO for WordPress
Introduction to SEO and SEO for WordPressChris Burgess
 
Word press security checklist
Word press security checklistWord press security checklist
Word press security checklistSanjay Dabhoya
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri
 
20 Tips to Improving WordPress Website - for Beginners-Aus-2017
20 Tips to Improving WordPress Website - for Beginners-Aus-201720 Tips to Improving WordPress Website - for Beginners-Aus-2017
20 Tips to Improving WordPress Website - for Beginners-Aus-2017TRB Design, Inc.
 
20 tips to Improving Your WordPress Site...for Beginners
20 tips to Improving Your WordPress Site...for Beginners20 tips to Improving Your WordPress Site...for Beginners
20 tips to Improving Your WordPress Site...for BeginnersTRB Design, Inc.
 
Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!J_Cortes
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Sucuri
 
WordPress Themes Demystified
WordPress Themes DemystifiedWordPress Themes Demystified
WordPress Themes DemystifiedChris Burgess
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressChelsea O'Brien
 
WordPress SEO & Optimisation
WordPress SEO & OptimisationWordPress SEO & Optimisation
WordPress SEO & OptimisationJoost de Valk
 
10 Ways to Secure WordPress
10 Ways to Secure WordPress10 Ways to Secure WordPress
10 Ways to Secure WordPressJeremy Green
 
Staying Connected: Securing Your WordPress Website
Staying Connected: Securing Your WordPress WebsiteStaying Connected: Securing Your WordPress Website
Staying Connected: Securing Your WordPress WebsiteRaymund Mitchell
 
8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your JoomlaSiteGround.com
 

What's hot (20)

Installing WordPress The Right Way
Installing WordPress The Right WayInstalling WordPress The Right Way
Installing WordPress The Right Way
 
Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress Troubleshooting
 
Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best Performance
 
Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016
Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016
Paid Traffic with WordPress PPC Hacks - by Peter Mead for BigDigital 2016
 
40 of the Most Popular WordPress Plugins
40 of the Most Popular WordPress Plugins40 of the Most Popular WordPress Plugins
40 of the Most Popular WordPress Plugins
 
What I learned about SEO (while building a WordPress Theme)
What I learned about SEO (while building a WordPress Theme)What I learned about SEO (while building a WordPress Theme)
What I learned about SEO (while building a WordPress Theme)
 
Managing WordPress
Managing WordPressManaging WordPress
Managing WordPress
 
Introduction to SEO and SEO for WordPress
Introduction to SEO and SEO for WordPressIntroduction to SEO and SEO for WordPress
Introduction to SEO and SEO for WordPress
 
Word press security checklist
Word press security checklistWord press security checklist
Word press security checklist
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
 
20 Tips to Improving WordPress Website - for Beginners-Aus-2017
20 Tips to Improving WordPress Website - for Beginners-Aus-201720 Tips to Improving WordPress Website - for Beginners-Aus-2017
20 Tips to Improving WordPress Website - for Beginners-Aus-2017
 
20 tips to Improving Your WordPress Site...for Beginners
20 tips to Improving Your WordPress Site...for Beginners20 tips to Improving Your WordPress Site...for Beginners
20 tips to Improving Your WordPress Site...for Beginners
 
Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?
 
WordPress Themes Demystified
WordPress Themes DemystifiedWordPress Themes Demystified
WordPress Themes Demystified
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
WordPress SEO & Optimisation
WordPress SEO & OptimisationWordPress SEO & Optimisation
WordPress SEO & Optimisation
 
10 Ways to Secure WordPress
10 Ways to Secure WordPress10 Ways to Secure WordPress
10 Ways to Secure WordPress
 
Staying Connected: Securing Your WordPress Website
Staying Connected: Securing Your WordPress WebsiteStaying Connected: Securing Your WordPress Website
Staying Connected: Securing Your WordPress Website
 
8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla
 

Viewers also liked

Accelerated Mobile Pages (AMP)
Accelerated Mobile Pages (AMP)Accelerated Mobile Pages (AMP)
Accelerated Mobile Pages (AMP)Chris Burgess
 
SEO Training at Envatotalks
SEO Training at EnvatotalksSEO Training at Envatotalks
SEO Training at EnvatotalksChris Burgess
 
Tori Cushing - Actionable SEO Insights - SMX 2015
Tori Cushing - Actionable SEO Insights - SMX 2015Tori Cushing - Actionable SEO Insights - SMX 2015
Tori Cushing - Actionable SEO Insights - SMX 2015Victoria Cushing
 
How to achieve mind-blowing Content Marketing ROI
How to achieve mind-blowing Content Marketing ROIHow to achieve mind-blowing Content Marketing ROI
How to achieve mind-blowing Content Marketing ROIJeremy Cabral
 
Mobile Visibility to the Max - 2016 Edition #BigDigitalADL
Mobile Visibility to the Max - 2016 Edition #BigDigitalADLMobile Visibility to the Max - 2016 Edition #BigDigitalADL
Mobile Visibility to the Max - 2016 Edition #BigDigitalADLAleyda Solís
 
Harnessing The Power Of Archetypes For Your Digital Marketing
Harnessing The Power Of Archetypes For Your Digital MarketingHarnessing The Power Of Archetypes For Your Digital Marketing
Harnessing The Power Of Archetypes For Your Digital MarketingGianluca Fiorelli
 
Writing the Right Content at #SMS2016
Writing the Right Content at #SMS2016 Writing the Right Content at #SMS2016
Writing the Right Content at #SMS2016 Aleyda Solís
 
Negotiating crawl budget with googlebots
Negotiating crawl budget with googlebotsNegotiating crawl budget with googlebots
Negotiating crawl budget with googlebotsDawn Anderson MSc DigM
 
Keeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AU
Keeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AUKeeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AU
Keeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AUJason Mun
 
Build on Chassis: Introduction to a Solid Development Workflow
Build on Chassis: Introduction to a Solid Development WorkflowBuild on Chassis: Introduction to a Solid Development Workflow
Build on Chassis: Introduction to a Solid Development WorkflowJapheth Thomson
 
Contributing to WordPress: Why it's Important to Your Business
Contributing to WordPress: Why it's Important to Your Business Contributing to WordPress: Why it's Important to Your Business
Contributing to WordPress: Why it's Important to Your Business Kel
 
WordPress Menus - Melbourne User Meetup
WordPress Menus - Melbourne User MeetupWordPress Menus - Melbourne User Meetup
WordPress Menus - Melbourne User MeetupChris Burgess
 
Recurring Revenue Roadmap Keynote
Recurring Revenue Roadmap KeynoteRecurring Revenue Roadmap Keynote
Recurring Revenue Roadmap KeynoteTroy Dean
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemLancope, Inc.
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 

Viewers also liked (17)

Accelerated Mobile Pages (AMP)
Accelerated Mobile Pages (AMP)Accelerated Mobile Pages (AMP)
Accelerated Mobile Pages (AMP)
 
SEO Training at Envatotalks
SEO Training at EnvatotalksSEO Training at Envatotalks
SEO Training at Envatotalks
 
Tori Cushing - Actionable SEO Insights - SMX 2015
Tori Cushing - Actionable SEO Insights - SMX 2015Tori Cushing - Actionable SEO Insights - SMX 2015
Tori Cushing - Actionable SEO Insights - SMX 2015
 
How to achieve mind-blowing Content Marketing ROI
How to achieve mind-blowing Content Marketing ROIHow to achieve mind-blowing Content Marketing ROI
How to achieve mind-blowing Content Marketing ROI
 
Mobile Visibility to the Max - 2016 Edition #BigDigitalADL
Mobile Visibility to the Max - 2016 Edition #BigDigitalADLMobile Visibility to the Max - 2016 Edition #BigDigitalADL
Mobile Visibility to the Max - 2016 Edition #BigDigitalADL
 
Harnessing The Power Of Archetypes For Your Digital Marketing
Harnessing The Power Of Archetypes For Your Digital MarketingHarnessing The Power Of Archetypes For Your Digital Marketing
Harnessing The Power Of Archetypes For Your Digital Marketing
 
Writing the Right Content at #SMS2016
Writing the Right Content at #SMS2016 Writing the Right Content at #SMS2016
Writing the Right Content at #SMS2016
 
Negotiating crawl budget with googlebots
Negotiating crawl budget with googlebotsNegotiating crawl budget with googlebots
Negotiating crawl budget with googlebots
 
Keeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AU
Keeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AUKeeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AU
Keeping Things Lean & Mean: Crawl Optimisation - Search Marketing Summit AU
 
Build on Chassis: Introduction to a Solid Development Workflow
Build on Chassis: Introduction to a Solid Development WorkflowBuild on Chassis: Introduction to a Solid Development Workflow
Build on Chassis: Introduction to a Solid Development Workflow
 
Final cbd slides
Final cbd slidesFinal cbd slides
Final cbd slides
 
Contributing to WordPress: Why it's Important to Your Business
Contributing to WordPress: Why it's Important to Your Business Contributing to WordPress: Why it's Important to Your Business
Contributing to WordPress: Why it's Important to Your Business
 
WordPress Menus - Melbourne User Meetup
WordPress Menus - Melbourne User MeetupWordPress Menus - Melbourne User Meetup
WordPress Menus - Melbourne User Meetup
 
Recurring Revenue Roadmap Keynote
Recurring Revenue Roadmap KeynoteRecurring Revenue Roadmap Keynote
Recurring Revenue Roadmap Keynote
 
Security Threat Mapping
Security Threat MappingSecurity Threat Mapping
Security Threat Mapping
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 

Similar to Identifying a Compromised WordPress Site

Professional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsProfessional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsChris Burgess
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a DatabaseJohn Ashmead
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Nick Galbreath
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
 
ProdSec: A Technical Approach
ProdSec: A Technical ApproachProdSec: A Technical Approach
ProdSec: A Technical ApproachJeremy Brown
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
Owasp tds
Owasp tdsOwasp tds
Owasp tdssnyff
 
Security at Greenhouse
Security at GreenhouseSecurity at Greenhouse
Security at GreenhouseMichael O'Neil
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareLeigh Honeywell
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersTony Perez
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 
Secure at Speed @ Solent.tech
Secure at Speed @ Solent.techSecure at Speed @ Solent.tech
Secure at Speed @ Solent.techStuart Gunter
 
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...apidays
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Security Innovation
 

Similar to Identifying a Compromised WordPress Site (20)

Professional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsProfessional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security Plugins
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
ProdSec: A Technical Approach
ProdSec: A Technical ApproachProdSec: A Technical Approach
ProdSec: A Technical Approach
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Owasp tds
Owasp tdsOwasp tds
Owasp tds
 
Security at Greenhouse
Security at GreenhouseSecurity at Greenhouse
Security at Greenhouse
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website Owners
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Secure at Speed @ Solent.tech
Secure at Speed @ Solent.techSecure at Speed @ Solent.tech
Secure at Speed @ Solent.tech
 
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
 

More from Chris Burgess

Getting Started with Google Data Studio
Getting Started with Google Data StudioGetting Started with Google Data Studio
Getting Started with Google Data StudioChris Burgess
 
WordPress Hosting Basics
WordPress Hosting BasicsWordPress Hosting Basics
WordPress Hosting BasicsChris Burgess
 
Improving the WordPress Ecosystem with Tide
Improving the WordPress Ecosystem with TideImproving the WordPress Ecosystem with Tide
Improving the WordPress Ecosystem with TideChris Burgess
 
Deep Dive Into Yoast SEO 7
Deep Dive Into Yoast SEO 7Deep Dive Into Yoast SEO 7
Deep Dive Into Yoast SEO 7Chris Burgess
 
Bootstrapping eCommerce with WordPress and WooCommerce
Bootstrapping eCommerce with WordPress and WooCommerceBootstrapping eCommerce with WordPress and WooCommerce
Bootstrapping eCommerce with WordPress and WooCommerceChris Burgess
 
Choosing the Right WordPress Theme
Choosing the Right WordPress ThemeChoosing the Right WordPress Theme
Choosing the Right WordPress ThemeChris Burgess
 
SEO Basics for Bloggers
SEO Basics for BloggersSEO Basics for Bloggers
SEO Basics for BloggersChris Burgess
 

More from Chris Burgess (8)

Getting Started with Google Data Studio
Getting Started with Google Data StudioGetting Started with Google Data Studio
Getting Started with Google Data Studio
 
WordPress Hosting Basics
WordPress Hosting BasicsWordPress Hosting Basics
WordPress Hosting Basics
 
Improving the WordPress Ecosystem with Tide
Improving the WordPress Ecosystem with TideImproving the WordPress Ecosystem with Tide
Improving the WordPress Ecosystem with Tide
 
Deep Dive Into Yoast SEO 7
Deep Dive Into Yoast SEO 7Deep Dive Into Yoast SEO 7
Deep Dive Into Yoast SEO 7
 
Bootstrapping eCommerce with WordPress and WooCommerce
Bootstrapping eCommerce with WordPress and WooCommerceBootstrapping eCommerce with WordPress and WooCommerce
Bootstrapping eCommerce with WordPress and WooCommerce
 
WordPress and SSL
WordPress and SSLWordPress and SSL
WordPress and SSL
 
Choosing the Right WordPress Theme
Choosing the Right WordPress ThemeChoosing the Right WordPress Theme
Choosing the Right WordPress Theme
 
SEO Basics for Bloggers
SEO Basics for BloggersSEO Basics for Bloggers
SEO Basics for Bloggers
 

Recently uploaded

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 

Recently uploaded (20)

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 

Identifying a Compromised WordPress Site