SlideShare a Scribd company logo
4
Hacking WordPress
&
Countermeasures
NESTOR ANGULO DE UGARTE
WORDCAMP OSAKA 2019
#WCOSAKA
こんにちわ!
6
Who I am 7
u Computer Science Engineer &
Technology consultant
u Photographer & Early Adopter
u Truly curious guy
u 2015: SUCURI
Incident Response & Easy SSL
u 2019: GoDaddy Spain
Interim Head of IT @ GoDaddy
Spain
Where is カ
ナリア諸島
8
9
About
u Sucuri: Anaconda
(No Securi / Security)
u Website security
u Fully remote (people from > 25
countries around the world)
u 2008: Foundation
u 2017: Proud part of the
GoDaddy family
u Free scanners:
u Sitecheck
(sitecheck.sucuri.net)
u Performance
(performance.sucuri.net)
10
#WCOsaka2019 Nestor Angulo (@pharar)
Concepts
GIVING CONTEXT
11
#WCOsaka2019NestorAngulo(@pharar)
DISCLAIMER 12
#WCOsaka2019 Nestor Angulo (@pharar)
Any sensitive information has been protected/encrypted to
preserve privacy. Any similiarity with reality is a coincidence.
I’m responsible of what I say, not what you interpret.
Always ask an expert.
#WCOsaka2019 Nestor Angulo (@pharar) 13
#WCOsaka2019 Nestor Angulo (@pharar) 14
ハッキングされた企業と、
ハッキングされたことをま
だ知らない企業の2種類があ
ります。
HACKER VS Cyberterrorist 15
#WCOsaka2019 Nestor Angulo (@pharar)
Hacker:
Curious person who loves to go
beyond limits or convetionalisms.
Cyberterrorist / Cracker:
Computer Hacker, whom intentions are
always aligned to enrich himself in a zero-
sum game situation.
The bad guy
Hacker Hat Colours 16
u Black Hat
Cyberterrorist,
thief
u Grey Hat
White Hat using
illegal procedures
u White Hat
Security Analyst,
ethical hacker
Malware
u Software intentionally designed to cause
damage to a computer, client, or computer
network.
u Some types:
u Backdoors, zero-day
u Exploits
u Trojan horses, Fremium plugins
u Ransomware, Spyware
u Adware, Scareware
17
CyberSecurity
& Web Security
18
u Cybersecurity:
Security in the digital world
u Web Security:
Field of Cybersecurity
u Covers what happens
through port 80 / 443
FACTS 19
Site hacking
almost never is
client-oriented
(98% of cases)
Almost always
happens due to a
deficient monitoring
/ maintenance
A SSL certificate
is not an
antihacking shield
Patches & security
updates appear
almost always after
hacking exploits
Errare Humanum Est
(Human being fails)
Security never is
(nor will be)
100% effective
FACTS
20
Source: Website Hack Trend Report 2018 – sucuri.net
The Art of War
IN THE MIND OF YOUR ENEMY
Common Targets 22
#WCOsaka2019 Nestor Angulo (@pharar)
Users info Database
Website
Content
Infrastructure Bot Net Reputation
Know your weaknesses 23
u You are your weakest point
u You can be scammed
u Passwords.
u Vulnerable to brute force attacks
u Leftovers
u Admin users
u Outdated/vulnerable software
u Enabled/Disabled not-in-use
plugins/themes
u Non-secure connection (avoid public wifi)
u Vulnerable to Man-In-the-Middle attacks
Hacking WordPress. The Process 24
Vulnerability
->Exploit
Injection
Final code Backdoor
Spam /
defacement
BotNode Final code
Definitions 25
u Vulnerability
u Bug in the code or posibility of misuse
that can be exploited to perform
unauthorized actions within a
computer system.
u Exploit
u Software that leverages a
vulnerability
u Backdoor
u Malware which allows remote
execution of code
WPScan
Vulnerability
Database
wpvulndb.com
26
Gallery of Horrors
27
#WCOsaka2019NestorAngulo(@pharar)
Defacements
Defacements
Example 1:
Photographer
Gallery
30
31
#WCOsaka2019NestorAngulo(@pharar)
32
#WCOsaka2019NestorAngulo(@pharar)
Example 2:
Pet food store
33
34
35
Bonus
36
37
DEFACEMENTS
38
#WCOsaka2019 Nestor Angulo (@pharar)
Partial / full replacement of website
frontend.
Very obvious
Easy detection:
- Users (hear them!)
- Scanners
Target:
Awareness or social/political
revindication
Black Hat SEO /
Spam
40
41
42
43
44
BLACK HAT
SEO / SPAM
45
#WCOsaka2019 Nestor Angulo (@pharar)
Spam/unwanted content in
your site
Detection:
- Scanners (Easy)
- Users (hear them!)
- Search Engine warnings
Target:
Your SEO and reputation
DDoS Attacks /
BotNets
Definitions 47
u DoS attack
- Denial of Service
- Overhelmed application due to a
huge amount of petitions
u DDoS attack
u Distributed DoS
u BotNet
u Net of websites linked to act
coordinated
u Have bot nodes and a bot master
Normal, tending to calm
48
49
50
BOTNETS,
CRYPTOMINERS,
DDOS
51
#WCOsaka2019 Nestor Angulo (@pharar)
Affecting to your infrastructure
Detection:
- Usually difficult
- Strange use of resources
- File Integrity Scanner
WAF recommended
Target:
- Your server’s resources
- User’s resources.
- Zombie node
Countermeasures
REACTIVES AND PROACTIVE MEASURES
52
#WCOsaka2019NestorAngulo(@pharar)
Characters in the Story
(if something happens)
53
You
• Owner /
Admins
• Developer &
Designer
• Users/clients
Hosting
Provider
• Agent / C3
• Support &
Backups
Security
Expert
• Security
department
• External
services
Security in Layers 54
u You ( the weakest layer )
u Your device ( Antivirus )
u Your connection ( SSL )
u Your website ( WAF )
u Your credentials ( Strong Passwords / 2FA )
u Your site security ( monitor / updates )
u Your server security ( monitor / updates )
u Your database ( monitor )
u Maintenance tasks
Measures: Reactive vs Proactive 55
#WCOsaka2019 Nestor Angulo (@pharar)
Reactive:
When bad things have
already happened
Pain mitigation
Proactive:
Before anything bad
happens
Risk mitigation
#WCOsaka2019 Nestor Angulo (@pharar)
Reactive
measures
u Scan your site:
uStatus: Sitecheck.sucuri.net
uBlacklist: Virustotal.com
u CRC: Check, Remove and
Change
u Update
u Restore a backup
56
57
#WCOsaka2019NestorAngulo(@pharar)
#WCOsaka2019 Nestor Angulo (@pharar)
Proactive
measures
u Reduce admins, plugins and
themes
u Backups
u Updates
u Invest in Hosting & Security
u WAF
58
The more Doors,
the higher Risk
59
#WCOsaka2019 Nestor Angulo (@pharar)
“To Caesar, what is Caesar’s”.
Admin stuff with admin account. The
rest, with a limited account
The more admins, plugins and themes
the more risk (even when disabled).
All user’s passwords MUST be
unique and strong
(better with 2FA when possible)
Applied to all layers
(wp-admin, [S]FTP, cPanel, dashboard,
db, …)
BACKUPS 60
u Have a backups strategy
uNEVER store the backups in your
production server
uA clean and FUNCTIONAL
backup will be your best friend a
bad day
BACKUPS 61
u Have a backups strategy
uNEVER store the backups in your
production server
uA clean and
backup will be your best friend a
bad day
Updates
62
u PLUGINS
u THEMES
u CORE
u PHP
u APACHE / NGINX
u SERVER
u CPANEL / PLESK
u …
Updates
63
Source:
Web Professional Security
Survey 2019 – Sucuri.net
Remember to Invest in 64
#WCOsaka2019 Nestor Angulo (@pharar)
SECURITY HOSTING
Hosting 65
#WCOsaka2019 Nestor Angulo (@pharar)
FIRST LAYER OF
YOUR SITE’S DEFENSE
BALANCE BETWEEN
PRICE AND FEATURES
THEY ARE IN CHARGE OF THE
SERVER’S SERVICES, DATABASE
AND MAINTENANCE
Shared hosting vs dedicated
#WCOsaka2019NestorAngulo(@pharar)
66
Source: 2019 Sucuri survey to ecommerce owners. 67
WAF
Your guard
dog
68
#WCOsaka2019 Nestor Angulo (@pharar)
FILTERS ALL YOUR
WEB TRAFFIC
PROTECTS AGAINST
XSS, DDOS, …
PATCHS VIRTUALLY WIDELY
KNOWN SOFTWARE
VULNERABILITIES
IF IT INCLUDES CDN,
IMPROVES YOUR SITE’S
SPEED &
PERFORMANCE
FORENSIC ANALISYS
TOOL
ALLOWS MANUAL
BLOCKING
WAF
Your guard
dog
69
#WCOsaka2019 Nestor Angulo (@pharar)
FILTERS ALL YOUR WEB
TRAFFIC
PROTECTS AGAINST XSS,
DDOS, …
PATCHS VIRTUALLY WELL
KNOWN SOFTWARE
VULNERABILITIES
IF IT INCLUDES CDN,
YOUR SITE WILL IMPROVE
ITS SPEED AND
PERFORMANCE
FORENSIC ANALISYS
TOOL
ALLOWS MANUAL
BLOCKING
70
#WCOsaka2019 Nestor Angulo (@pharar)
71
#WCOsaka2019NestorAngulo(@pharar)
ありがとうござ
いました︕
ご質問は︖
72
@pharar #WCOSAKA2019

More Related Content

What's hot (20)

PDF
It's Okay To Touch Yourself - DerbyCon 2013
Ben Ten (0xA)
 
PDF
Rugged Software Using Rugged Driven Development
James Wickett
 
PDF
Preparing for the inevitable: The mobile incident response playbook
NowSecure
 
PDF
Hackfest presentation.pptx
Peter Yaworski
 
PDF
OWASP, the life and the universe
Sébastien GIORIA
 
PDF
The Seven Axioms Of Security
Saumil Shah
 
PDF
Redefining Defense - HITB2017AMS Keynote
Saumil Shah
 
PPTX
Bug Bounty - Play For Money
Shubham Gupta
 
PPTX
CLUSIR INFONORD OWASP iot 2014
Sebastien Gioria
 
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
Cyren, Inc
 
PDF
APT(Advanced Persistent Threats) & strategies to counter APT
Avkash Kathiriya
 
PDF
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Saumil Shah
 
PDF
Securiser son digital workplace avec Microsoft Threat Protection
☁️Seyfallah Tagrerout☁ [MVP]
 
PDF
HoneyPy Honeypot (OWASP Triangle Chapter)
Phillip Maddux
 
PDF
Secure Coding For Java - Une introduction
Sebastien Gioria
 
PDF
Seminar enkripsi unsyiah 15 nov 2013
IGN MANTRA
 
PPTX
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Mazin Ahmed
 
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
PDF
Bug Bounty - Hackers Job
Arbin Godar
 
PDF
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
 
It's Okay To Touch Yourself - DerbyCon 2013
Ben Ten (0xA)
 
Rugged Software Using Rugged Driven Development
James Wickett
 
Preparing for the inevitable: The mobile incident response playbook
NowSecure
 
Hackfest presentation.pptx
Peter Yaworski
 
OWASP, the life and the universe
Sébastien GIORIA
 
The Seven Axioms Of Security
Saumil Shah
 
Redefining Defense - HITB2017AMS Keynote
Saumil Shah
 
Bug Bounty - Play For Money
Shubham Gupta
 
CLUSIR INFONORD OWASP iot 2014
Sebastien Gioria
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Cyren, Inc
 
APT(Advanced Persistent Threats) & strategies to counter APT
Avkash Kathiriya
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Saumil Shah
 
Securiser son digital workplace avec Microsoft Threat Protection
☁️Seyfallah Tagrerout☁ [MVP]
 
HoneyPy Honeypot (OWASP Triangle Chapter)
Phillip Maddux
 
Secure Coding For Java - Une introduction
Sebastien Gioria
 
Seminar enkripsi unsyiah 15 nov 2013
IGN MANTRA
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Mazin Ahmed
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
Bug Bounty - Hackers Job
Arbin Godar
 
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
 

Similar to Hacking WordPress... and countermeasures. (20)

PDF
Hacking WordPress & countermeasures.
Nestor Angulo de Ugarte
 
PDF
I've been hacked! So, now, what!?
Nestor Angulo de Ugarte
 
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
PPTX
Embracing Legacy: Learnings from Argentum Online
RequitoLucas
 
PPTX
vodQA(Pune) 2018 - QAing the security way
vodQA
 
PDF
QAing the security way!
Amit Gundiyal
 
PDF
2014 09-04-pj
Sébastien GIORIA
 
PPT
Mission Impossible Short Version
Valerie Houghton
 
PPT
Mission Impossible Short Version
Valerie Houghton
 
PDF
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Cyber Security Alliance
 
PDF
The bad, the ugly and the weird about IoT
Speck&Tech
 
PDF
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
PDF
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
PDF
DMA - Stupid Cyber Criminal Tricks
ThreatReel Podcast
 
PDF
How to prevent cyber terrorism taragana
Gilles Sgro
 
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
lior mazor
 
PPTX
Web Application Security
sudip pudasaini
 
PDF
I can be apple and so can you
Shakacon
 
PDF
What is being exposed from IoT Devices
The Security of Things Forum
 
PDF
iotsecurity-171108154118.pdf
KerimBozkanli
 
Hacking WordPress & countermeasures.
Nestor Angulo de Ugarte
 
I've been hacked! So, now, what!?
Nestor Angulo de Ugarte
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
Embracing Legacy: Learnings from Argentum Online
RequitoLucas
 
vodQA(Pune) 2018 - QAing the security way
vodQA
 
QAing the security way!
Amit Gundiyal
 
2014 09-04-pj
Sébastien GIORIA
 
Mission Impossible Short Version
Valerie Houghton
 
Mission Impossible Short Version
Valerie Houghton
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Cyber Security Alliance
 
The bad, the ugly and the weird about IoT
Speck&Tech
 
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
DMA - Stupid Cyber Criminal Tricks
ThreatReel Podcast
 
How to prevent cyber terrorism taragana
Gilles Sgro
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
lior mazor
 
Web Application Security
sudip pudasaini
 
I can be apple and so can you
Shakacon
 
What is being exposed from IoT Devices
The Security of Things Forum
 
iotsecurity-171108154118.pdf
KerimBozkanli
 

More from Nestor Angulo de Ugarte (6)

PPTX
¿Cuál es el coste real de un hackeo en web?
Nestor Angulo de Ugarte
 
PPTX
Limpiar Sitios Hackeados
Nestor Angulo de Ugarte
 
PDF
Hacking WordPress. El Arte de La Guerra.
Nestor Angulo de Ugarte
 
PDF
Me han Hackeado... ¿Y ahora qué?
Nestor Angulo de Ugarte
 
PDF
WordCamp Madrid CSI: El caso de las Backdoors
Nestor Angulo de Ugarte
 
PDF
Backdoor: El Bueno, El Feo y el Malo
Nestor Angulo de Ugarte
 
¿Cuál es el coste real de un hackeo en web?
Nestor Angulo de Ugarte
 
Limpiar Sitios Hackeados
Nestor Angulo de Ugarte
 
Hacking WordPress. El Arte de La Guerra.
Nestor Angulo de Ugarte
 
Me han Hackeado... ¿Y ahora qué?
Nestor Angulo de Ugarte
 
WordCamp Madrid CSI: El caso de las Backdoors
Nestor Angulo de Ugarte
 
Backdoor: El Bueno, El Feo y el Malo
Nestor Angulo de Ugarte
 

Recently uploaded (20)

PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Français Patch Tuesday - Juillet
Ivanti
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Top Managed Service Providers in Los Angeles
Captain IT
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Français Patch Tuesday - Juillet
Ivanti
 

Hacking WordPress... and countermeasures.