SlideShare ist ein Scribd-Unternehmen logo
1 von 36
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
#AskSucuri
How Websites Get Hacked
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
TONY PEREZ
@perezbox
Tony Perez | @perezbox
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
WHO IS THIS TALK FOR?
• Currently infected
• Have been infected
• Curious how someone hacked their website
• Curious about the various attack vectors
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Quick Review
The Impacts of Compromise
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Malware Distribution Search Engine Poisoning Spam EmailPhishing Lures
Infection Types
Defacement DDoS/Bots/Backdoors Ransomware
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
THE IMPACTS OF COMPROMISE
Brand Website Blacklisting
Emotional Distress
Economic
Business
Visitor Compromise
Technical
SEO Impacts
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Website Hacks
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
April 2016 – 1.02 Billion Websites
73%33%
CMS Powered Websites CMS Market Share
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
The Environment
A complex ecosystem
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Environment
Local Machine Local Network User
Attack Surface
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Domain Threat Landscape
Environment
 Devices (i.e., Desktop, Notebooks, Tablets)
 Networks (i.e., Public Wifi, Insecure Networks)
 End-users (i.e., Poor administration / maintenance)
Application
Server
Infrastructure
 CMS (i.e., WordPress, Joomla!, Magento, Drupal, etc..)
 Non-CMS Applications (i.e,. Plesk, WHCMS, Cpanel, etc..)
 Multi-function environments (i.e., email / file servers, etc…)
 Web Server (i.e., Apache, NGINX, Varnish, IIS, etc…)
 Operating Systems (i.e., Linux, Windows, etc…)
 Languages (i.e., PHP, .NET, Node.js, etc…)
 Server Daemons (i.,e FTP, SFTP, SSH, etc...)
 Hosting companies
 Physical servers
 Hardware peripherals (i.e., Routers, Switches)
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Application Server InfrastructureEnvironment
Security Chain
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Types of Attacks
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Targeted Attacks Attacks of Opportunity
 Occurs .001% of the time
 There is a specific “target”
 How the attack will happen is unknown
 The exploit is unknown, defined by what is found
 There is enough motivation and return
 Automated / Manual
 High-level of skill / expertise
 Personal (i.e., political, competitor, hatred)
 Modus operandi for organizations
 Occurs 99.99% of the time
 Don’t have a specific “target”
 The attack is known
 The exploit is known, low-hanging fruit
 The motivation and return is dependent on mass affect
 Mostly automated
 Low-mid level skill / expertise
 Not-Personal (i.e., wrong place, wrong time)
 Modus operandi for website attacks
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Attack Flow
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Automation
• Key in today’s attacks, making it the most effective way to affect 10’s of
thousands of websites at the same time (i.e., maximum exposure and
increased potential for success)
• Introduces efficiency and effectiveness into the attack sequence, enabling less
skill adversaries (i.e., new breed of script kiddies)
• Allows bad actors to be faster to the draw targeting new software vulnerabilities
• Enabled by the development and expansion of global bot networks (botnets)
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Reconnaissance
Identification
Exploitation
Sustainment
Compromise
Cleanup
AutomatedTargeted
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Phase Targeted
Reconnaissance Scanning a specific environment
Identification
Exploitation
Sustainment
Identify the potential attack vectors
on the network
Exploit a specific weakness
based on services in
environment
Ensure attacker can continue
to get into environment
Compromise
Cleanup
Accomplish the objective
Reduce odds of detection,
cover tracks
Scanning the web for a specific
issue
Occurs in Reconnaissance phase
Exploit known weakness
Ensure attacker can continue
to get into environment
Accomplish the objective
N/A
Opportunity
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Phase Considerations
Reconnaissance
How are you reducing your attack
surface?
Identification
Exploitation
Sustainment
How do you know what
vulnerabilities exist?
How are you mitigating
exploitation attempts?
How do you know there are no
backdoors?
Compromise
Cleanup
How do you know if you’re
currently compromised?
Are you retaining all activity
remotely?
 Disable unused services, ports,
applications
 Vulnerability management program
(i.e., wpscan, joomlascan, etc… )
 Employ cloud-based WAF / IPS
 Employ IDS technology designed to
detect these issues
 Employ IDS technology designed to
report Indicators of Compromise (IoC)
and integrity issues
 Employ an auditing / remote retention
mechanism
Security Controls
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Availability
• Availability describes your websites uptime, or accessibility, to your audience.
• Some hacks don’t intend on compromising the website or it’s resources, instead
they are content with overwhelming resources and disrupting it’s availability
• Known as Denial of Service (DoS) and Distributed Denial of Service (DDoS)
attacks.
• Attackers are able to overwhelm resources on a network, drastically affects
shard hosts and small web servers, can lead to websites being disabled to save
the network
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Attack Vectors
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
How Websites Get Hacked
Access Control Software Vulnerabilities
Cross-site
Contamination
Third-Party
Integrations
Hosting
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Access Control
• Refers to how access is restricted to specific areas, places, or things.
• Websites access control extends to all applications that provide some form of
access to the web environment:
• CMS Administration panel
• Hosting Administration Panel
• Server Access Nodes (i.e., FTP, SFTP, SSH)
• When thinking about access control, think beyond the website. application.
• Attacks to access control come in he form of Brute Force attacks.
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Software Vulnerabilities
• Refers to bugs in code that can be abused to perform nefarious acts. They
include things like:
• SQL Injection (SQLi), Cross-Site Scripting (XSS), Remote Code Execution (RCE), Remote File Inclusion (RFI), etc.…
• Familiarize yourself with the Open Web Application Security Project (OWASP),
specifically the OWASP Top 10.
• CMS applications struggle with vulnerabilities in their extensible parts (i.e.,
plugins, themes, extension, modules, etc…)
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Cross-site Contamination
• Refers to the lateral movement an attacker makes once in the web server.
• This is referred to as an internal attack, not an external one. An attacker is able
to gain entry into the web server via a vulnerable site, then use that to leap frog
into all other websites on the web server.
• It’s often the contributing factor to a number of reinfections, website owners
focus on the website affected and the symptoms, but spend little time looking at
the websites that show no external signs of compromise.
• Rampant in environments that do not employ functional isolation on the web
server, and employ improper permissions and configurations.
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Third-Party Integrations
• Third-party integration refer to a number of things, the most prevalent affecting
security is the integration of ads and their associated ad networks.
• These integrations are introducing a weak link into the security chain, where ad
networks are attacked and used to penetrate unsuspecting websites -
malvertising
• Malvertising is the act of manipulate ads to distribute malware, often in the form
of malicious redirects and drive-by-downloads
• Exceptionally difficult to detect because of their conditional nature, and the fact
that they are outside of the website environment
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Hosting
• It’s been a long time since there has been a mass-compromise of a large
shared-hosting provider (circa 2011)
• The issues with hosts today revolve around hosts that aren’t really hosts;
organizations that try to offer a complete solution – marketing / development /
security / hosting / SEO, etc..
• Inexperienced service providers that introduce confusion and noise to an already crowded
marketplace
• They know enough to be dangerous, but rarely house the in-house skills or knowledge
• Contribute to a number of cross-site contamination issues due to poor configurations
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Thinking Website Security
How to improve your website security posture
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Security is not a static state,
it’s a continuous process.
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Technology will never replace your
responsibility as a website owner.
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Security is not a Do It Yourself (DIY) project.
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
Q & A
Tweet us @SucuriSecurity using #AskSucuri
How WEBSITES get HACKEDWEBINAR
Tony Perez | @perezbox #AskSucuri
WEBINAR
Tony Perez | @perezbox #AskSucuri
THANK YOU!

Weitere ähnliche Inhalte

Was ist angesagt?

Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website TrendsSucuri
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?Sucuri
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecuritySucuri
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?Sucuri
 
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri
 
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsSucuri
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Sucuri
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri
 
Logs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteLogs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteSucuri
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri
 
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users SafeTBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users SafeTony Perez
 
Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018SecuRing
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Mazin Ahmed
 

Was ist angesagt? (20)

Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital Marketers
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
 
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online Store
 
Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.Sucuri Webinar: Oh No! My Website Has Been Hacked.
Sucuri Webinar: Oh No! My Website Has Been Hacked.
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
 
Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?Kludges and PHP. Why Should You Use a WAF?
Kludges and PHP. Why Should You Use a WAF?
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web Agencies
 
Logs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteLogs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress Site
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
 
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users SafeTBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
 
Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 

Andere mochten auch

Tecnica pr violino dancla (www.sheetmusic-violin.blogspot.com)
Tecnica pr violino   dancla (www.sheetmusic-violin.blogspot.com)Tecnica pr violino   dancla (www.sheetmusic-violin.blogspot.com)
Tecnica pr violino dancla (www.sheetmusic-violin.blogspot.com)William Soph
 
Tilaisuuden avaus: Kalaparvi liikkuu
Tilaisuuden avaus: Kalaparvi liikkuuTilaisuuden avaus: Kalaparvi liikkuu
Tilaisuuden avaus: Kalaparvi liikkuuSovelto
 
cần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcm
cần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcmcần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcm
cần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcmbenjamin444
 
ระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจ
ระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจ
ระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจAssumption College Rayong
 
雲端居家量測系統
雲端居家量測系統雲端居家量測系統
雲端居家量測系統Wei Wang
 
AWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWS
AWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWSAWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWS
AWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWSAmazon Web Services
 
Will post-election Philippines continue to be conducive for FDI? | The stance...
Will post-election Philippines continue to be conducive for FDI? | The stance...Will post-election Philippines continue to be conducive for FDI? | The stance...
Will post-election Philippines continue to be conducive for FDI? | The stance...Kyna Tsai
 
KDK Trade Charity Club - Plan A Presentation
KDK Trade Charity Club - Plan A PresentationKDK Trade Charity Club - Plan A Presentation
KDK Trade Charity Club - Plan A PresentationDaniel Spiteri
 
สารสนเทศเพื่อประกอบการตัดสินใจ
สารสนเทศเพื่อประกอบการตัดสินใจสารสนเทศเพื่อประกอบการตัดสินใจ
สารสนเทศเพื่อประกอบการตัดสินใจPawinee Paraprom
 
Co curricular primary school
Co curricular primary schoolCo curricular primary school
Co curricular primary schoolFatima Tuzarah
 
Process mining - a case by ING Belgium and Python Predictions
Process mining - a case by ING Belgium and Python PredictionsProcess mining - a case by ING Belgium and Python Predictions
Process mining - a case by ING Belgium and Python PredictionsPython Predictions
 
Analytic powerhouse parallel data warehouse und r
Analytic powerhouse parallel data warehouse und rAnalytic powerhouse parallel data warehouse und r
Analytic powerhouse parallel data warehouse und rMarcel Franke
 

Andere mochten auch (20)

P0w3rp0intz
P0w3rp0intzP0w3rp0intz
P0w3rp0intz
 
Tecnica pr violino dancla (www.sheetmusic-violin.blogspot.com)
Tecnica pr violino   dancla (www.sheetmusic-violin.blogspot.com)Tecnica pr violino   dancla (www.sheetmusic-violin.blogspot.com)
Tecnica pr violino dancla (www.sheetmusic-violin.blogspot.com)
 
Tilaisuuden avaus: Kalaparvi liikkuu
Tilaisuuden avaus: Kalaparvi liikkuuTilaisuuden avaus: Kalaparvi liikkuu
Tilaisuuden avaus: Kalaparvi liikkuu
 
cần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcm
cần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcmcần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcm
cần thuê dịch vụ giúp việc theo giờ tốt giá rẻ ở tphcm
 
ระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจ
ระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจ
ระบบสารสนเทศเพื่อสนับสนุนการตัดสินใจ
 
雲端居家量測系統
雲端居家量測系統雲端居家量測系統
雲端居家量測系統
 
Advanced micro devices
Advanced micro devicesAdvanced micro devices
Advanced micro devices
 
发贴
发贴发贴
发贴
 
AWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWS
AWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWSAWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWS
AWS Summit Stockholm 2014 – B3 – Integrating on-premises workloads with AWS
 
Will post-election Philippines continue to be conducive for FDI? | The stance...
Will post-election Philippines continue to be conducive for FDI? | The stance...Will post-election Philippines continue to be conducive for FDI? | The stance...
Will post-election Philippines continue to be conducive for FDI? | The stance...
 
Power BI visuals
Power BI visualsPower BI visuals
Power BI visuals
 
KDK Trade Charity Club - Plan A Presentation
KDK Trade Charity Club - Plan A PresentationKDK Trade Charity Club - Plan A Presentation
KDK Trade Charity Club - Plan A Presentation
 
สารสนเทศเพื่อประกอบการตัดสินใจ
สารสนเทศเพื่อประกอบการตัดสินใจสารสนเทศเพื่อประกอบการตัดสินใจ
สารสนเทศเพื่อประกอบการตัดสินใจ
 
Wordpress
WordpressWordpress
Wordpress
 
SAP on AWS | Scottsdale, AZ
SAP on AWS | Scottsdale, AZSAP on AWS | Scottsdale, AZ
SAP on AWS | Scottsdale, AZ
 
Co curricular primary school
Co curricular primary schoolCo curricular primary school
Co curricular primary school
 
Incident Response: SIEM
Incident Response: SIEMIncident Response: SIEM
Incident Response: SIEM
 
Driving growth in B2B through digital
Driving growth in B2B through digitalDriving growth in B2B through digital
Driving growth in B2B through digital
 
Process mining - a case by ING Belgium and Python Predictions
Process mining - a case by ING Belgium and Python PredictionsProcess mining - a case by ING Belgium and Python Predictions
Process mining - a case by ING Belgium and Python Predictions
 
Analytic powerhouse parallel data warehouse und r
Analytic powerhouse parallel data warehouse und rAnalytic powerhouse parallel data warehouse und r
Analytic powerhouse parallel data warehouse und r
 

Ähnlich wie Sucuri Webinar: How Websites Get Hacked

Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?Tony Perez
 
The frustration with website security
The frustration with website securityThe frustration with website security
The frustration with website securitySucuri
 
Navigating the Security Landscape
Navigating the Security LandscapeNavigating the Security Landscape
Navigating the Security LandscapeSucuri
 
Webinar - Tips and Tricks on Website Security
Webinar - Tips and Tricks on Website SecurityWebinar - Tips and Tricks on Website Security
Webinar - Tips and Tricks on Website SecurityStopTheHacker
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityImperva Incapsula
 
Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Shrutirupa Banerjiee
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacksFrank Victory
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security ThreatsHTS Hosting
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableIIMBNSRCEL
 
Attack on computer
Attack on computerAttack on computer
Attack on computerRabail khan
 
Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015Joe Ferguson
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersNavigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersTony Perez
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquadJosh Howell
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointZack Meyers
 

Ähnlich wie Sucuri Webinar: How Websites Get Hacked (20)

Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?
 
The frustration with website security
The frustration with website securityThe frustration with website security
The frustration with website security
 
Navigating the Security Landscape
Navigating the Security LandscapeNavigating the Security Landscape
Navigating the Security Landscape
 
Webinar - Tips and Tricks on Website Security
Webinar - Tips and Tricks on Website SecurityWebinar - Tips and Tricks on Website Security
Webinar - Tips and Tricks on Website Security
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)Infosec girls training-hackcummins-college-jan-2020(v0.1)
Infosec girls training-hackcummins-college-jan-2020(v0.1)
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
 
AW-Infs201101067.pptx
AW-Infs201101067.pptxAW-Infs201101067.pptx
AW-Infs201101067.pptx
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015Secure Form Processing and Protection - Sunshine PHP 2015
Secure Form Processing and Protection - Sunshine PHP 2015
 
Phishing
PhishingPhishing
Phishing
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersNavigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website Owners
 
4774.projectb.securitysquad
4774.projectb.securitysquad4774.projectb.securitysquad
4774.projectb.securitysquad
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 

Mehr von Sucuri

Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri
 
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRSucuri
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebSucuri
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website SecuritySucuri
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaSucuri
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPressSucuri
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Sucuri
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSucuri
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSucuri
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecuritySucuri
 

Mehr von Sucuri (14)

Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
 
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio WebWebinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
Webinar: 10 Consejos para Mejorar la Postura de Seguridad de tu Sitio Web
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Otimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & ResiliênciaOtimização de Websites para Ganho de Performance & Resiliência
Otimização de Websites para Ganho de Performance & Resiliência
 
Guia de Segurança para WordPress
Guia de Segurança para WordPressGuia de Segurança para WordPress
Guia de Segurança para WordPress
 
Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?Gambiarra e PHP. Por que você deveria usar um WAF?
Gambiarra e PHP. Por que você deveria usar um WAF?
 
Segurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus ClientesSegurança para Agências: Proteja seus Clientes
Segurança para Agências: Proteja seus Clientes
 
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu NegocioSeguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
Seguridad para Agencias de Desarrollo Web: Protege tus Clientes y tu Negocio
 
WHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & SecurityWHDusa 2017: Bridging the Divide between Human Behavior & Security
WHDusa 2017: Bridging the Divide between Human Behavior & Security
 

Kürzlich hochgeladen

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 

Kürzlich hochgeladen (20)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 

Sucuri Webinar: How Websites Get Hacked

  • 1. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri #AskSucuri How Websites Get Hacked
  • 2. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri TONY PEREZ @perezbox Tony Perez | @perezbox
  • 3. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri WHO IS THIS TALK FOR? • Currently infected • Have been infected • Curious how someone hacked their website • Curious about the various attack vectors
  • 4. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Quick Review The Impacts of Compromise
  • 5. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Malware Distribution Search Engine Poisoning Spam EmailPhishing Lures Infection Types Defacement DDoS/Bots/Backdoors Ransomware
  • 6. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri THE IMPACTS OF COMPROMISE Brand Website Blacklisting Emotional Distress Economic Business Visitor Compromise Technical SEO Impacts
  • 7. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Website Hacks
  • 8. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri April 2016 – 1.02 Billion Websites 73%33% CMS Powered Websites CMS Market Share
  • 9. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri The Environment A complex ecosystem
  • 10. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Environment Local Machine Local Network User Attack Surface
  • 11. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Domain Threat Landscape Environment  Devices (i.e., Desktop, Notebooks, Tablets)  Networks (i.e., Public Wifi, Insecure Networks)  End-users (i.e., Poor administration / maintenance) Application Server Infrastructure  CMS (i.e., WordPress, Joomla!, Magento, Drupal, etc..)  Non-CMS Applications (i.e,. Plesk, WHCMS, Cpanel, etc..)  Multi-function environments (i.e., email / file servers, etc…)  Web Server (i.e., Apache, NGINX, Varnish, IIS, etc…)  Operating Systems (i.e., Linux, Windows, etc…)  Languages (i.e., PHP, .NET, Node.js, etc…)  Server Daemons (i.,e FTP, SFTP, SSH, etc...)  Hosting companies  Physical servers  Hardware peripherals (i.e., Routers, Switches)
  • 12. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Application Server InfrastructureEnvironment Security Chain
  • 13. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Types of Attacks
  • 14. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Targeted Attacks Attacks of Opportunity  Occurs .001% of the time  There is a specific “target”  How the attack will happen is unknown  The exploit is unknown, defined by what is found  There is enough motivation and return  Automated / Manual  High-level of skill / expertise  Personal (i.e., political, competitor, hatred)  Modus operandi for organizations  Occurs 99.99% of the time  Don’t have a specific “target”  The attack is known  The exploit is known, low-hanging fruit  The motivation and return is dependent on mass affect  Mostly automated  Low-mid level skill / expertise  Not-Personal (i.e., wrong place, wrong time)  Modus operandi for website attacks
  • 15. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Attack Flow
  • 16. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Automation • Key in today’s attacks, making it the most effective way to affect 10’s of thousands of websites at the same time (i.e., maximum exposure and increased potential for success) • Introduces efficiency and effectiveness into the attack sequence, enabling less skill adversaries (i.e., new breed of script kiddies) • Allows bad actors to be faster to the draw targeting new software vulnerabilities • Enabled by the development and expansion of global bot networks (botnets)
  • 17. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Reconnaissance Identification Exploitation Sustainment Compromise Cleanup AutomatedTargeted
  • 18. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Phase Targeted Reconnaissance Scanning a specific environment Identification Exploitation Sustainment Identify the potential attack vectors on the network Exploit a specific weakness based on services in environment Ensure attacker can continue to get into environment Compromise Cleanup Accomplish the objective Reduce odds of detection, cover tracks Scanning the web for a specific issue Occurs in Reconnaissance phase Exploit known weakness Ensure attacker can continue to get into environment Accomplish the objective N/A Opportunity
  • 19. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Phase Considerations Reconnaissance How are you reducing your attack surface? Identification Exploitation Sustainment How do you know what vulnerabilities exist? How are you mitigating exploitation attempts? How do you know there are no backdoors? Compromise Cleanup How do you know if you’re currently compromised? Are you retaining all activity remotely?  Disable unused services, ports, applications  Vulnerability management program (i.e., wpscan, joomlascan, etc… )  Employ cloud-based WAF / IPS  Employ IDS technology designed to detect these issues  Employ IDS technology designed to report Indicators of Compromise (IoC) and integrity issues  Employ an auditing / remote retention mechanism Security Controls
  • 20. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Availability • Availability describes your websites uptime, or accessibility, to your audience. • Some hacks don’t intend on compromising the website or it’s resources, instead they are content with overwhelming resources and disrupting it’s availability • Known as Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. • Attackers are able to overwhelm resources on a network, drastically affects shard hosts and small web servers, can lead to websites being disabled to save the network
  • 21. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Attack Vectors
  • 22. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri How Websites Get Hacked Access Control Software Vulnerabilities Cross-site Contamination Third-Party Integrations Hosting
  • 23. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Access Control • Refers to how access is restricted to specific areas, places, or things. • Websites access control extends to all applications that provide some form of access to the web environment: • CMS Administration panel • Hosting Administration Panel • Server Access Nodes (i.e., FTP, SFTP, SSH) • When thinking about access control, think beyond the website. application. • Attacks to access control come in he form of Brute Force attacks.
  • 24. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Software Vulnerabilities • Refers to bugs in code that can be abused to perform nefarious acts. They include things like: • SQL Injection (SQLi), Cross-Site Scripting (XSS), Remote Code Execution (RCE), Remote File Inclusion (RFI), etc.… • Familiarize yourself with the Open Web Application Security Project (OWASP), specifically the OWASP Top 10. • CMS applications struggle with vulnerabilities in their extensible parts (i.e., plugins, themes, extension, modules, etc…)
  • 25. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Cross-site Contamination • Refers to the lateral movement an attacker makes once in the web server. • This is referred to as an internal attack, not an external one. An attacker is able to gain entry into the web server via a vulnerable site, then use that to leap frog into all other websites on the web server. • It’s often the contributing factor to a number of reinfections, website owners focus on the website affected and the symptoms, but spend little time looking at the websites that show no external signs of compromise. • Rampant in environments that do not employ functional isolation on the web server, and employ improper permissions and configurations.
  • 26. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Third-Party Integrations • Third-party integration refer to a number of things, the most prevalent affecting security is the integration of ads and their associated ad networks. • These integrations are introducing a weak link into the security chain, where ad networks are attacked and used to penetrate unsuspecting websites - malvertising • Malvertising is the act of manipulate ads to distribute malware, often in the form of malicious redirects and drive-by-downloads • Exceptionally difficult to detect because of their conditional nature, and the fact that they are outside of the website environment
  • 27. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Hosting • It’s been a long time since there has been a mass-compromise of a large shared-hosting provider (circa 2011) • The issues with hosts today revolve around hosts that aren’t really hosts; organizations that try to offer a complete solution – marketing / development / security / hosting / SEO, etc.. • Inexperienced service providers that introduce confusion and noise to an already crowded marketplace • They know enough to be dangerous, but rarely house the in-house skills or knowledge • Contribute to a number of cross-site contamination issues due to poor configurations
  • 28. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Thinking Website Security How to improve your website security posture
  • 29. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Security is not a static state, it’s a continuous process.
  • 30. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri
  • 31. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Technology will never replace your responsibility as a website owner.
  • 32. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri
  • 33. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Security is not a Do It Yourself (DIY) project.
  • 34. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri
  • 35. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri Q & A Tweet us @SucuriSecurity using #AskSucuri
  • 36. How WEBSITES get HACKEDWEBINAR Tony Perez | @perezbox #AskSucuri WEBINAR Tony Perez | @perezbox #AskSucuri THANK YOU!