SlideShare a Scribd company logo
Securing Your WordPress Website

             Vladimir Lasky
         http://wpexpert.com.au/
         WordCamp Sydney 2012
                                   1
What’s New In Today’s Talk?

1.   The biggest security threats of 2012 and how
     to deal with them
2.   An updated list of essential WordPress
     hardening steps for EVERY site
3.   New WordPress management services that
     make your life easier


                                              2
Big Events in Internet Security This Year

1.   Yahoo, LinkedIn, eHarmony all experienced
     security incidents that resulted in users’
     passwords/hashes being published
2.   Lots of exploits targeting code using
     vulnerable PHP libraries including TimThumb
     and Uploadify
3.   Wi-Fi Protected Setup (WPS) vulnerability in
     Wireless Routers revealed in December 2011
                                             3
4
5
Lessons From Password Disclosure Incidents

1.   You cannot assume any website will properly secure their
     databases.
2.   Plenty of computational power exists for brute-force
     password cracking of password hashes – spare no effort
     to prevent these from being leaked.
3.   People who reuse the same password across different
     sites are asking to get “p0wned” and become targets for
     identity theft.
4.   Having a unique, secure password for every Internet
     account is mandatory.                                  6
Wi-Fi Protected Setup
Wi-




                        7
Lessons from WPS Vulnerability

1.   The WPS exploit provides a backdoor to
     wireless routers secured with WPA2
2.   Technologies that overcome security
     burdens often introduce security holes
3.   Disable WPS in every Wi-Fi Router that you
     control. In some cases, this will require a
     firmware upgrade or possibly even replacing
     the router                                    8
Example PHP Exploit Attempt




                              9
Lessons from PHP Exploits

1.   Many programmers are lazy or ignorant of
     proper data validation practices
2.   Obtaining plugins and themes from official
     sources reduces risk, but does not guaratee
     security
3.   Application firewalls are a NECESSITY


                                             10
Essential Steps to Harden Your WP Installation




                                         11
Install WP Firewall 2

  This plugin analyses HTTP requests and checks
  for suspicious parameters that indicate PHP or
  SQL injection attempts
  It will protect you against the majority of zero-
  day exploits
  Set the configuration option ‘Suppress similar
  attack warning emails’ to ‘On’, to prevent being
  deluged with identical warnings.
                                                 12
Rename Your Admin Account

1.   Use the plugin ‘Admin Renamer Extended’ to
     rename the ‘admin’ account to something
     unique.
2.   From the WP Dashboard, go to Users->Your
     Profile. For the option set ‘Display Name
     Publicly as’, choose something that is not
     the same as your admin account name

                                                 13
Change the Default MySQL Table Prefix

1.   The WordPress default MySQL table prefix is
     ‘wp_’.
2.   By renaming this to something else, ie. ‘tb132_’
     we can foil the majority of blind SQL injection
     attempts
3.   For an existing site, use the plugin “WordPress
     Table Rename” to make this easier.

                                                   14
Prevent Plaintext Password Transmission – Best Option

1.   Have your site hosted with a provider that supports
     HTTPS and provides either:
     –   Their own Shared SSL Certificate
     –   The ability to install your own
     –   The ability to obtain one for you and install it (usually for a
         fee)

2.   Install the plugin “WP HTTPS (SSL)” and enable the
     option “Force SSL Administration”.
3.   This will prevent your password and session cookies
     from being sniffed (captured) over the Network                 15
Prevent Plaintext Password Transmission – Next Best

1.   If you can’t use HTTPS, then install the plugin
     “Semisecure Login Reimagined”.
2.   This uses Javascript to encrypt your password
     before sending it to the server
3.   Make sure you logout from WordPress to
     prevent network eavedroppers from sniffing
     (capturing) and re-using your session key.

                                                   16
Prevent Brute-Force Login Attempts
        Brute-
  Install one of the following plugins:
1. Login Security Solution
     –   Slows down response time of your website after
         multiple failed attempts
     –   Prevents users from choosing weak passwords
         and
2.   Limit Login Attempts
     –   Locks out accounts for a set time period after
         multiple failed attempts


                                                          17
Install WP File Monitor Plus
 This plugin monitors files under your
 WP installation for changes.
 When a change is detected, it
 displays a dashboard alert and can
 also send an email
 As an administrator, you can view
 the list of changes and spot anything
 unexpected or unusual
                                     18
Essential Security Habits




                            19
Regularly Update Your Site, Plugins and Themes

  The last talk stressed the importance of performing
  regular updates to WordPress, themes and plugins
  and performing regular remotely-initiated backups
  Several WordPress management services now exist
  to simply and speed up these steps:
 –   ManageWP (hosted)
 –   InfiniteWP (self-hosted)
 –   WP Remote (hosted)
 –   Worpit (hosted)
                                                  20
Accessing Your Site From Untrusted PCs

  Two-Factor authentication is mandatory
  This is a combination of a password and a random
  number from a key fob, SMS message or a mobile
  phone app that you obtain each time you log in
  WordPress Two-Factor plugins include:
 1.   Second Factor
 2.   Google Authenticator
 3.   Duo Two-Factor Authentication


                                                   21
Accessing Your Site From Untrusted Networks

1.   If you can, use your smart phone or laptop
     PC equipped with 3G, 4G or GPRS Mobile
     Internet
2.   If you are forced to use a public WiFi access
     point or LAN, ensure that any sites requiring
     authentication are accessed via their HTTPS
     (secure) link.

                                               22
Choosing a Password
 Twelve characters long as a minimum, but not a
 dictionary word
 Common number/letter substitutions provide little
 extra security – cracking tools almost always check
 for these




                                                  23
Password Memorisation Techniques
1.   Come up with a memorable sentence, and use the
     first letters of each word to form the password e.g.
     – “Jack and Jill went up the hill to fetch a pale of water”
       could form a 13-character password “JaJwuthtfapow”

2.   Three unrelated unconnected dictionary words one
     after the other, misspelt a certain way known to
     you
     On your own trusted PC, consider using an
     encrypted password manager like KeePass
                                                                   24
Conclusion
 Slides from Previous Talk at Wordcamp GC 2011:
 – http://slidesha.re/tr2XA5
 – Covers the “Three Pillars of Security”, the aims of attackers and other
    WordPress security plugins

 ManageWP - 30% discount on all plans for WordCamp Sydney
 Attendees:
 – http://managewp.com/wcsyd

 Questions and Comments:
 – http://wpexpert.com.au/contact-us/




                                                                         25

More Related Content

What's hot

Advanced Web Hosting
Advanced Web HostingAdvanced Web Hosting
Advanced Web Hosting
OVHcloud
 
Adobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office HoursAdobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office Hours
Andrew Khoury
 
Lessons On Hyper V
Lessons On Hyper VLessons On Hyper V
Lessons On Hyper V
Aidan Finn
 
S903 palla
S903 pallaS903 palla
S903 palla
Andrew Khoury
 
WordPress MU 101
WordPress MU 101WordPress MU 101
WordPress MU 101
Pete Mall
 
Speeding Up WordPress sites
Speeding Up WordPress sitesSpeeding Up WordPress sites
Speeding Up WordPress sites
Jason Yingling
 
High performance WordPress
High performance WordPressHigh performance WordPress
High performance WordPress
Mikel King
 
Redundancy Rocks. Redundancy Rocks.
Redundancy Rocks. Redundancy Rocks.Redundancy Rocks. Redundancy Rocks.
Redundancy Rocks. Redundancy Rocks.
AOE
 
Web agencies: An analysis of the OVH infrastructure to optimise your web proj...
Web agencies: An analysis of the OVH infrastructure to optimise your web proj...Web agencies: An analysis of the OVH infrastructure to optimise your web proj...
Web agencies: An analysis of the OVH infrastructure to optimise your web proj...
OVHcloud
 
Word Press Security
Word Press SecurityWord Press Security
Word Press Security
Randall Rode
 
Accelerate your ColdFusion Applications using Caching
Accelerate your ColdFusion Applications using CachingAccelerate your ColdFusion Applications using Caching
Accelerate your ColdFusion Applications using Caching
ColdFusionConference
 
Advancedtroubleshooting 101208145718-phpapp01
Advancedtroubleshooting 101208145718-phpapp01Advancedtroubleshooting 101208145718-phpapp01
Advancedtroubleshooting 101208145718-phpapp01
Suresh Kumar
 
Mastering VMware Datacenter - 15 Modules
Mastering VMware Datacenter - 15 ModulesMastering VMware Datacenter - 15 Modules
Mastering VMware Datacenter - 15 Modules
M.M.Rahman Munna, Linux, VMware and Mail Server Expert
 
Linux system administration - part-2
Linux system administration - part-2Linux system administration - part-2
Linux system administration - part-2
M.M.Rahman Munna, Linux, VMware and Mail Server Expert
 
Web Speed And Scalability
Web Speed And ScalabilityWeb Speed And Scalability
Web Speed And Scalability
Jason Ragsdale
 
Advantages of cPanel-based LiteSpeed Hosting
Advantages of cPanel-based LiteSpeed HostingAdvantages of cPanel-based LiteSpeed Hosting
Advantages of cPanel-based LiteSpeed Hosting
Lisa Clarke
 
Vsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guideVsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guide
Sree Harsha Boyapati
 
Protect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes SecurityProtect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes Security
Red8 Interactive
 
Caching
CachingCaching
Caching
Nascenia IT
 

What's hot (19)

Advanced Web Hosting
Advanced Web HostingAdvanced Web Hosting
Advanced Web Hosting
 
Adobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office HoursAdobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office Hours
 
Lessons On Hyper V
Lessons On Hyper VLessons On Hyper V
Lessons On Hyper V
 
S903 palla
S903 pallaS903 palla
S903 palla
 
WordPress MU 101
WordPress MU 101WordPress MU 101
WordPress MU 101
 
Speeding Up WordPress sites
Speeding Up WordPress sitesSpeeding Up WordPress sites
Speeding Up WordPress sites
 
High performance WordPress
High performance WordPressHigh performance WordPress
High performance WordPress
 
Redundancy Rocks. Redundancy Rocks.
Redundancy Rocks. Redundancy Rocks.Redundancy Rocks. Redundancy Rocks.
Redundancy Rocks. Redundancy Rocks.
 
Web agencies: An analysis of the OVH infrastructure to optimise your web proj...
Web agencies: An analysis of the OVH infrastructure to optimise your web proj...Web agencies: An analysis of the OVH infrastructure to optimise your web proj...
Web agencies: An analysis of the OVH infrastructure to optimise your web proj...
 
Word Press Security
Word Press SecurityWord Press Security
Word Press Security
 
Accelerate your ColdFusion Applications using Caching
Accelerate your ColdFusion Applications using CachingAccelerate your ColdFusion Applications using Caching
Accelerate your ColdFusion Applications using Caching
 
Advancedtroubleshooting 101208145718-phpapp01
Advancedtroubleshooting 101208145718-phpapp01Advancedtroubleshooting 101208145718-phpapp01
Advancedtroubleshooting 101208145718-phpapp01
 
Mastering VMware Datacenter - 15 Modules
Mastering VMware Datacenter - 15 ModulesMastering VMware Datacenter - 15 Modules
Mastering VMware Datacenter - 15 Modules
 
Linux system administration - part-2
Linux system administration - part-2Linux system administration - part-2
Linux system administration - part-2
 
Web Speed And Scalability
Web Speed And ScalabilityWeb Speed And Scalability
Web Speed And Scalability
 
Advantages of cPanel-based LiteSpeed Hosting
Advantages of cPanel-based LiteSpeed HostingAdvantages of cPanel-based LiteSpeed Hosting
Advantages of cPanel-based LiteSpeed Hosting
 
Vsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guideVsphere esxi-vcenter-server-55-troubleshooting-guide
Vsphere esxi-vcenter-server-55-troubleshooting-guide
 
Protect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes SecurityProtect Your WordPress Website - Setting Up IThemes Security
Protect Your WordPress Website - Setting Up IThemes Security
 
Caching
CachingCaching
Caching
 

Viewers also liked

20140521 DO-1 Baseline Report_FINAL
20140521 DO-1 Baseline Report_FINAL20140521 DO-1 Baseline Report_FINAL
20140521 DO-1 Baseline Report_FINAL
sbasgall
 
Social Networking
Social NetworkingSocial Networking
Social Networking
Satapon Yosakonkun
 
Kesaksian astronaut tentang ufo
Kesaksian astronaut tentang ufoKesaksian astronaut tentang ufo
Kesaksian astronaut tentang ufo
Nur Agustinus
 
Atividade de inglês festa junina
Atividade de inglês festa juninaAtividade de inglês festa junina
Atividade de inglês festa junina
Daniela Azevedo
 
Attraction Social Media Intro
Attraction Social Media IntroAttraction Social Media Intro
Attraction Social Media Intro
Lars Toftefors
 
Upcoming Unity Schedule
Upcoming Unity ScheduleUpcoming Unity Schedule
Upcoming Unity Schedule
Gary Gangnes
 
การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero
การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero
การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero
Satapon Yosakonkun
 
OSS Application on Linux เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศ
OSS Application on Linux  เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศOSS Application on Linux  เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศ
OSS Application on Linux เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศ
Satapon Yosakonkun
 
การทำรายการอ้างอิงด้วย Open Source Reference Manager : Zotero
การทำรายการอ้างอิงด้วย  Open Source Reference Manager : Zoteroการทำรายการอ้างอิงด้วย  Open Source Reference Manager : Zotero
การทำรายการอ้างอิงด้วย Open Source Reference Manager : Zotero
Satapon Yosakonkun
 
Como preguntarnos
Como preguntarnosComo preguntarnos
Como preguntarnos
Arturo Hernández
 
Gtd
GtdGtd
ฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยี
ฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยีฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยี
ฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยี
Satapon Yosakonkun
 
Introduction to Agile and SCRUm
Introduction to Agile and SCRUmIntroduction to Agile and SCRUm
Introduction to Agile and SCRUm
Sumeet Moghe
 
Swa 23 edisi Social Entrepreneurship
Swa 23 edisi Social EntrepreneurshipSwa 23 edisi Social Entrepreneurship
Swa 23 edisi Social Entrepreneurship
Nur Agustinus
 
โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...
โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...
โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...
Satapon Yosakonkun
 
สร้างสังคมดีด้วยเทคโนโลยีสารสนเทศ
สร้างสังคมดีด้วยเทคโนโลยีสารสนเทศสร้างสังคมดีด้วยเทคโนโลยีสารสนเทศ
สร้างสังคมดีด้วยเทคโนโลยีสารสนเทศ
Satapon Yosakonkun
 
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
Satapon Yosakonkun
 
OpenSource Software for Thesaurus & Reference tools
OpenSource Software for Thesaurus & Reference toolsOpenSource Software for Thesaurus & Reference tools
OpenSource Software for Thesaurus & Reference tools
Satapon Yosakonkun
 
Kiat bekerja di tempat baru
Kiat bekerja di tempat baruKiat bekerja di tempat baru
Kiat bekerja di tempat baru
Nur Agustinus
 

Viewers also liked (20)

20140521 DO-1 Baseline Report_FINAL
20140521 DO-1 Baseline Report_FINAL20140521 DO-1 Baseline Report_FINAL
20140521 DO-1 Baseline Report_FINAL
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Kesaksian astronaut tentang ufo
Kesaksian astronaut tentang ufoKesaksian astronaut tentang ufo
Kesaksian astronaut tentang ufo
 
Atividade de inglês festa junina
Atividade de inglês festa juninaAtividade de inglês festa junina
Atividade de inglês festa junina
 
Attraction Social Media Intro
Attraction Social Media IntroAttraction Social Media Intro
Attraction Social Media Intro
 
Upcoming Unity Schedule
Upcoming Unity ScheduleUpcoming Unity Schedule
Upcoming Unity Schedule
 
การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero
การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero
การจัดการรายการบรรณานุกรมด้วย Zeteroการจัดการรายการบรรณานุกรมด้วย Zetero Zetero
 
OSS Application on Linux เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศ
OSS Application on Linux  เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศOSS Application on Linux  เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศ
OSS Application on Linux เพื่อการจัดการห้องสมุดและทรัพยากรสารสนเทศ
 
การทำรายการอ้างอิงด้วย Open Source Reference Manager : Zotero
การทำรายการอ้างอิงด้วย  Open Source Reference Manager : Zoteroการทำรายการอ้างอิงด้วย  Open Source Reference Manager : Zotero
การทำรายการอ้างอิงด้วย Open Source Reference Manager : Zotero
 
CIC 2007 Report
CIC 2007 ReportCIC 2007 Report
CIC 2007 Report
 
Como preguntarnos
Como preguntarnosComo preguntarnos
Como preguntarnos
 
Gtd
GtdGtd
Gtd
 
ฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยี
ฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยีฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยี
ฝ่ายบริการความรู้ทางวิทยาศาสตร์และเทคโนโลยี
 
Introduction to Agile and SCRUm
Introduction to Agile and SCRUmIntroduction to Agile and SCRUm
Introduction to Agile and SCRUm
 
Swa 23 edisi Social Entrepreneurship
Swa 23 edisi Social EntrepreneurshipSwa 23 edisi Social Entrepreneurship
Swa 23 edisi Social Entrepreneurship
 
โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...
โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...
โครงการถ่ายสำเนาอิเล็กทรอนิกส์หนังสือหายากจากประเทศสาธารณรัฐแห่งสหภาพพม่าตามพ...
 
สร้างสังคมดีด้วยเทคโนโลยีสารสนเทศ
สร้างสังคมดีด้วยเทคโนโลยีสารสนเทศสร้างสังคมดีด้วยเทคโนโลยีสารสนเทศ
สร้างสังคมดีด้วยเทคโนโลยีสารสนเทศ
 
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
 
OpenSource Software for Thesaurus & Reference tools
OpenSource Software for Thesaurus & Reference toolsOpenSource Software for Thesaurus & Reference tools
OpenSource Software for Thesaurus & Reference tools
 
Kiat bekerja di tempat baru
Kiat bekerja di tempat baruKiat bekerja di tempat baru
Kiat bekerja di tempat baru
 

Similar to Securing Your WordPress Website - WordCamp Sydney 2012

Locking down word press
Locking down word pressLocking down word press
Locking down word press
Zachary Russell
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
pcsafe
 
Security Function
Security FunctionSecurity Function
Security Function
Samuel Soon
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices Datasheets
Scientia Groups
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Secure
rmpall
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
Fort Rucker FRSA
 
Best practices datasheets
Best practices datasheetsBest practices datasheets
Best practices datasheets
frankold
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
Zero Point Development
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
Andrew Paton
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
Vlad Lasky
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
wordcampgc
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
Temok IT Services
 
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
StuartJDavidson.com
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
Angela Bowman
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
Cheap SSL Coupon Code
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
Christina Hawkins
 
6 - Web Application Security.pptx
6 - Web Application Security.pptx6 - Web Application Security.pptx
6 - Web Application Security.pptx
AlmaOraevi
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023
BeePlugin
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
Marko Heijnen
 

Similar to Securing Your WordPress Website - WordCamp Sydney 2012 (20)

Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Security Function
Security FunctionSecurity Function
Security Function
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices Datasheets
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Secure
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
 
Best practices datasheets
Best practices datasheetsBest practices datasheets
Best practices datasheets
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
 
6 - Web Application Security.pptx
6 - Web Application Security.pptx6 - Web Application Security.pptx
6 - Web Application Security.pptx
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
 

Recently uploaded

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 

Recently uploaded (20)

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 

Securing Your WordPress Website - WordCamp Sydney 2012

  • 1. Securing Your WordPress Website Vladimir Lasky http://wpexpert.com.au/ WordCamp Sydney 2012 1
  • 2. What’s New In Today’s Talk? 1. The biggest security threats of 2012 and how to deal with them 2. An updated list of essential WordPress hardening steps for EVERY site 3. New WordPress management services that make your life easier 2
  • 3. Big Events in Internet Security This Year 1. Yahoo, LinkedIn, eHarmony all experienced security incidents that resulted in users’ passwords/hashes being published 2. Lots of exploits targeting code using vulnerable PHP libraries including TimThumb and Uploadify 3. Wi-Fi Protected Setup (WPS) vulnerability in Wireless Routers revealed in December 2011 3
  • 4. 4
  • 5. 5
  • 6. Lessons From Password Disclosure Incidents 1. You cannot assume any website will properly secure their databases. 2. Plenty of computational power exists for brute-force password cracking of password hashes – spare no effort to prevent these from being leaked. 3. People who reuse the same password across different sites are asking to get “p0wned” and become targets for identity theft. 4. Having a unique, secure password for every Internet account is mandatory. 6
  • 8. Lessons from WPS Vulnerability 1. The WPS exploit provides a backdoor to wireless routers secured with WPA2 2. Technologies that overcome security burdens often introduce security holes 3. Disable WPS in every Wi-Fi Router that you control. In some cases, this will require a firmware upgrade or possibly even replacing the router 8
  • 10. Lessons from PHP Exploits 1. Many programmers are lazy or ignorant of proper data validation practices 2. Obtaining plugins and themes from official sources reduces risk, but does not guaratee security 3. Application firewalls are a NECESSITY 10
  • 11. Essential Steps to Harden Your WP Installation 11
  • 12. Install WP Firewall 2 This plugin analyses HTTP requests and checks for suspicious parameters that indicate PHP or SQL injection attempts It will protect you against the majority of zero- day exploits Set the configuration option ‘Suppress similar attack warning emails’ to ‘On’, to prevent being deluged with identical warnings. 12
  • 13. Rename Your Admin Account 1. Use the plugin ‘Admin Renamer Extended’ to rename the ‘admin’ account to something unique. 2. From the WP Dashboard, go to Users->Your Profile. For the option set ‘Display Name Publicly as’, choose something that is not the same as your admin account name 13
  • 14. Change the Default MySQL Table Prefix 1. The WordPress default MySQL table prefix is ‘wp_’. 2. By renaming this to something else, ie. ‘tb132_’ we can foil the majority of blind SQL injection attempts 3. For an existing site, use the plugin “WordPress Table Rename” to make this easier. 14
  • 15. Prevent Plaintext Password Transmission – Best Option 1. Have your site hosted with a provider that supports HTTPS and provides either: – Their own Shared SSL Certificate – The ability to install your own – The ability to obtain one for you and install it (usually for a fee) 2. Install the plugin “WP HTTPS (SSL)” and enable the option “Force SSL Administration”. 3. This will prevent your password and session cookies from being sniffed (captured) over the Network 15
  • 16. Prevent Plaintext Password Transmission – Next Best 1. If you can’t use HTTPS, then install the plugin “Semisecure Login Reimagined”. 2. This uses Javascript to encrypt your password before sending it to the server 3. Make sure you logout from WordPress to prevent network eavedroppers from sniffing (capturing) and re-using your session key. 16
  • 17. Prevent Brute-Force Login Attempts Brute- Install one of the following plugins: 1. Login Security Solution – Slows down response time of your website after multiple failed attempts – Prevents users from choosing weak passwords and 2. Limit Login Attempts – Locks out accounts for a set time period after multiple failed attempts 17
  • 18. Install WP File Monitor Plus This plugin monitors files under your WP installation for changes. When a change is detected, it displays a dashboard alert and can also send an email As an administrator, you can view the list of changes and spot anything unexpected or unusual 18
  • 20. Regularly Update Your Site, Plugins and Themes The last talk stressed the importance of performing regular updates to WordPress, themes and plugins and performing regular remotely-initiated backups Several WordPress management services now exist to simply and speed up these steps: – ManageWP (hosted) – InfiniteWP (self-hosted) – WP Remote (hosted) – Worpit (hosted) 20
  • 21. Accessing Your Site From Untrusted PCs Two-Factor authentication is mandatory This is a combination of a password and a random number from a key fob, SMS message or a mobile phone app that you obtain each time you log in WordPress Two-Factor plugins include: 1. Second Factor 2. Google Authenticator 3. Duo Two-Factor Authentication 21
  • 22. Accessing Your Site From Untrusted Networks 1. If you can, use your smart phone or laptop PC equipped with 3G, 4G or GPRS Mobile Internet 2. If you are forced to use a public WiFi access point or LAN, ensure that any sites requiring authentication are accessed via their HTTPS (secure) link. 22
  • 23. Choosing a Password Twelve characters long as a minimum, but not a dictionary word Common number/letter substitutions provide little extra security – cracking tools almost always check for these 23
  • 24. Password Memorisation Techniques 1. Come up with a memorable sentence, and use the first letters of each word to form the password e.g. – “Jack and Jill went up the hill to fetch a pale of water” could form a 13-character password “JaJwuthtfapow” 2. Three unrelated unconnected dictionary words one after the other, misspelt a certain way known to you On your own trusted PC, consider using an encrypted password manager like KeePass 24
  • 25. Conclusion Slides from Previous Talk at Wordcamp GC 2011: – http://slidesha.re/tr2XA5 – Covers the “Three Pillars of Security”, the aims of attackers and other WordPress security plugins ManageWP - 30% discount on all plans for WordCamp Sydney Attendees: – http://managewp.com/wcsyd Questions and Comments: – http://wpexpert.com.au/contact-us/ 25