SlideShare a Scribd company logo
1 of 16
Download to read offline
Leaked! Confessions of a Joomla DEV

Paul van Jaarsveld
Kalemanzi Media Solutions
@kalemanzi
Overview
●

Hackin 'n crackin (Why, who, what?!)

●

Prevention

●

Cure

●

Discussions / questions
Why, who, what?
●

Why do people want to “hack” sites?

●

Who / what does it?

●

What do they do?
Defaced – peer recognition
Various forms of attacks
●

SQL injection – make mysql run malicious
commands

●

Known vulnerabilities of outdated scripts

●

Poorly designed code

●

Generic passwords

●

Denial of Service / slashdot effect
DDOS attacks
Spam with a purpose
Payload
Phishing
Prevention: Your neighborhood
●

Hosting provider NB!

●

Rather Apache Linux than Win

●

Avoid shared hosting

●

PHP5, CGI not module, register_globals

●

PHP.ini settings (remote url incl etc.)

●

mod_security

●

Htaccess.txt .htaccess

●

Cpanel, ftp, ssh password etc.
Prevention: Your house
●

Bricks – Latest Joomla

●

Domestic workers – extensions bg. check

●

House contents – user data / content

●

The windows – what can be seen

●

The doors / gates – points of entry

●

Keys! NB. PSWD – what Master key?!

●

Radio and tv / internet – external / feeds

●

CCTV / alarm system – Monitor security

●

Insurance – regular incremental backups
Cracked, now what?!
Recovery Action plan!
●

●
●

●
●

●

Remove site from public_html (rename
script - rn public_html public_html_inf
Change passwords (sql, ftp, cpanel etc.)
Find a backup that was done before
infection and keep it handy
Do a comprehensive site audit
Find the source of the infection – use shell
script, common sense, versions etc.
Choose recovery strategy:
Strategy
●

Repair current instance eg. Remove
malicious code

●

Restore clean backup and fix holes

●

Make site live

●

Make sure the site is clean!

●

Have a plan in place for future
Questions
●

What extensions do you use?
Let's make a list right now!

●

How do you handle your hacked sites?
Welcome to the resistance ;-)

Paul van Jaarsveld
Kalemanzi Media Solutions
@kalemanzi

More Related Content

Similar to Leaked! Confessions of a Joomla DEV

Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Linuxmalaysia Malaysia
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
decatv
 

Similar to Leaked! Confessions of a Joomla DEV (20)

Web security 101
Web security 101Web security 101
Web security 101
 
Websec
WebsecWebsec
Websec
 
Security and why you need to review yours.
Security and why you need to review yours.Security and why you need to review yours.
Security and why you need to review yours.
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 
API Upload Test
API Upload TestAPI Upload Test
API Upload Test
 

More from Joomla Day South Africa

Peter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power SquaredPeter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power Squared
Joomla Day South Africa
 
Chris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOOChris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOO
Joomla Day South Africa
 
Brendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developersBrendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developers
Joomla Day South Africa
 
Yannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and AnalyticsYannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and Analytics
Joomla Day South Africa
 

More from Joomla Day South Africa (17)

Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
 
Joomla! 101 - Getting started & Finding help (level: Beginner)
Joomla! 101 - Getting started & Finding help (level: Beginner)Joomla! 101 - Getting started & Finding help (level: Beginner)
Joomla! 101 - Getting started & Finding help (level: Beginner)
 
Implementing and running Joomla at a large South African university
Implementing and running Joomla at a large South African universityImplementing and running Joomla at a large South African university
Implementing and running Joomla at a large South African university
 
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
 
Case Study Upgrading Joomlagov.info to Joomla 2.5 with responsive design
Case Study  Upgrading Joomlagov.info to Joomla 2.5 with responsive design Case Study  Upgrading Joomlagov.info to Joomla 2.5 with responsive design
Case Study Upgrading Joomlagov.info to Joomla 2.5 with responsive design
 
Streamlining Joomla Template Deployment and Updates across multiple installat...
Streamlining Joomla Template Deployment and Updates across multiple installat...Streamlining Joomla Template Deployment and Updates across multiple installat...
Streamlining Joomla Template Deployment and Updates across multiple installat...
 
Welcome to JoomlaDay Cape Town 2012
Welcome to JoomlaDay Cape Town 2012Welcome to JoomlaDay Cape Town 2012
Welcome to JoomlaDay Cape Town 2012
 
Successful Joomla migrations that don't hurt Search Engine Rankings
Successful Joomla migrations that don't hurt Search Engine RankingsSuccessful Joomla migrations that don't hurt Search Engine Rankings
Successful Joomla migrations that don't hurt Search Engine Rankings
 
Joomla SEO
Joomla SEOJoomla SEO
Joomla SEO
 
Peter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power SquaredPeter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power Squared
 
Simon Dowdles - Seblod CCK
Simon Dowdles - Seblod CCKSimon Dowdles - Seblod CCK
Simon Dowdles - Seblod CCK
 
Chris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOOChris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOO
 
Brendon Hatcher Joomla Security
Brendon Hatcher Joomla SecurityBrendon Hatcher Joomla Security
Brendon Hatcher Joomla Security
 
Brendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developersBrendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developers
 
Brendon Hatcher Joomla Distros
Brendon Hatcher Joomla DistrosBrendon Hatcher Joomla Distros
Brendon Hatcher Joomla Distros
 
Yannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and AnalyticsYannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and Analytics
 
Case Study: How we Built Joomlagov.info
Case Study: How we Built  Joomlagov.infoCase Study: How we Built  Joomlagov.info
Case Study: How we Built Joomlagov.info
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Leaked! Confessions of a Joomla DEV

  • 1. Leaked! Confessions of a Joomla DEV Paul van Jaarsveld Kalemanzi Media Solutions @kalemanzi
  • 2. Overview ● Hackin 'n crackin (Why, who, what?!) ● Prevention ● Cure ● Discussions / questions
  • 3. Why, who, what? ● Why do people want to “hack” sites? ● Who / what does it? ● What do they do?
  • 4. Defaced – peer recognition
  • 5. Various forms of attacks ● SQL injection – make mysql run malicious commands ● Known vulnerabilities of outdated scripts ● Poorly designed code ● Generic passwords ● Denial of Service / slashdot effect
  • 7. Spam with a purpose
  • 10. Prevention: Your neighborhood ● Hosting provider NB! ● Rather Apache Linux than Win ● Avoid shared hosting ● PHP5, CGI not module, register_globals ● PHP.ini settings (remote url incl etc.) ● mod_security ● Htaccess.txt .htaccess ● Cpanel, ftp, ssh password etc.
  • 11. Prevention: Your house ● Bricks – Latest Joomla ● Domestic workers – extensions bg. check ● House contents – user data / content ● The windows – what can be seen ● The doors / gates – points of entry ● Keys! NB. PSWD – what Master key?! ● Radio and tv / internet – external / feeds ● CCTV / alarm system – Monitor security ● Insurance – regular incremental backups
  • 13. Recovery Action plan! ● ● ● ● ● ● Remove site from public_html (rename script - rn public_html public_html_inf Change passwords (sql, ftp, cpanel etc.) Find a backup that was done before infection and keep it handy Do a comprehensive site audit Find the source of the infection – use shell script, common sense, versions etc. Choose recovery strategy:
  • 14. Strategy ● Repair current instance eg. Remove malicious code ● Restore clean backup and fix holes ● Make site live ● Make sure the site is clean! ● Have a plan in place for future
  • 15. Questions ● What extensions do you use? Let's make a list right now! ● How do you handle your hacked sites?
  • 16. Welcome to the resistance ;-) Paul van Jaarsveld Kalemanzi Media Solutions @kalemanzi