Information Security with Emphasis in WordPress, what is the security risk for a WordPress Administrator, running on CMS and WordPress. Must things to know for CyberSecurity.
contact with an affected animal or by being bitten by fleas or mosquitoes that have fed on an infected rabbit. Myxomatosis can be physically carried by an insect's mouthparts i.e: from an infected rabbit to another susceptible animal
της απρόσκοπτης λειτουργίας των υποδομών πληροφορικής & επικοινωνιών και την προστασία της εν λόγω λειτουργίας από αστοχία της τεχνολογίας ή κακόβουλη χρήση της. • Ασφάλεια ευαίσθητων πληροφοριών που υπάρχουν σε ψηφιακή μορφή. • Ομάδες αντιμετώπισης περιστατικών ασφάλειας Κυβερνοχώρου
Team (CSIRT) • Critical Information Infrastructure Protection (CIIP) • 250 Οργανισμοί που χρησιμοποιούν τον όρο CERT • Morris Worm (1988) - CERT Coordination Center (CERT-CC)-Carnegie Mellon University ΑΣΦΑΛΕΙΑ ΥΠΟΛΟΓΙΣΤΙΚΩΝ ΣΥΣΤΗΜΑΤΩΝ
Μέσων και Υποδομών (+Φυσική ασφάλεια). • Προστασία ακεραιότητας και της διαθεσιμότητας των πληροφοριών. • Προστασία των προς επεξεργασία και αποθηκευμένων προσωπικών δεδομένων. • Εξασφάλιση της μη αποποίησης ενεργειών. • Ταυτοποίηση αυθεντικοποίηση. ‐ • Εξασφάλιση διαθεσιμότητας όλων των συστημάτων https://www.owasp.org/index.php/About_OWASP#Core_Purpose ΑΣΦΑΛΕΙΑ ΥΠΟΛΟΓΙΣΤΙΚΩΝ ΣΥΣΤΗΜΑΤΩΝ
μας απο μη εξουσιοδοτημένους χρήστες Εξασφάλιση Δεδομένων και Υπ. Συστημάτων ότι είναι διαθέσιμα, όποτε ζητηθούν.Όποτε απαιτείτε. ( *Slashdot not Didos ) Οι πληροφορίες μας δεν θα πρέπει να αποκαλύπτονται σε μη εξουσιοδοτημένα άτομα. (Digital Thetfs) ΑΣΦΑΛΕΙΑ ΥΠΟΛΟΓΙΣΤΙΚΩΝ ΣΥΣΤΗΜΑΤΩΝ
advanced threats or common threats. Advanced cyber attackers have the advantage just one vulnerability to exploit your system, while you, must protect every system and vector. • Advanced detection • Response capabilities • Investigative capabilities • Real-time threat intelligence
to the correct use of core APIs and underlying server configuration which have been the source of common vulnerabilities 25 experts including lead developers and security researchers,collaborates with other security teams. [email protected] Automatic Background Updates for Security Releases (3.7.2, 3.7.3, 3.7.4) keeping the functionality is strongly recommended by the core team. Major Releases!!!! (3.4 to 3.5 , 3.5 to 3.6) define( ‘WP_AUTO_UPDATE_CORE’, true ); add_filter( ‘auto_update_plugin’, ‘_return_true’ ); add_filter( ‘auto_update_theme’, ‘_return_true’ ); Works to identify and resolve security issues in the core software,themes Plugins.
Management (XSS) A3 Cross Site Scripting (XSS) A4 Insecure Direct Object References A5 Security Misconfiguration A6 Sensitive Data Exposure A7 Missing Function Level Access Control A8 Cross Site Request Forgery (CSRF) A9 Using Components with Known Vulnerabilities A10-Unvalidated Redirects and Forwards the most common security mistakes that developers make and knows how to correct them.
"SELECT * FROM accounts WHERE custID='" + request.getParameter("id") +"'"; http://wp101-01.gr/accountView?id=' or '1'='1 text-based attacks You're website can be hacked in a minute
in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. An SQL query is a request for some action to be performed on a database. IF attackers are able to send their own instructions to your database and the database executes them, then you're vulnerable to SQL Injections.
used to identify a user that has logged into a website. “message exchange” Χορηγείτε στον Χρήστη κατά την πρώτη επίσκεψη στην ιστοσελίδα Attacker using a session hijacking (TCP session hijacking) TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network.
input from a user which might be malicious, and then stores that input in a data store for later use. Malicious Payload is stored in DB and is run by others.. Stored XSS does not need a malicious link to be exploited
injects browser executable code within a single HTTP response. The injected attack is not stored within the application itself it is non- persistent and only impacts users who open a maliciously crafted link or third-party web page. Reflected XSS are the most frequent type of XSS attacks found in the wild. Reflected XSS attacks are also known as non-persistent XSS attacks -PayLoad is embedded in URL -Victim visits malicious URL and gets EXPLOITED. <script>alert(123)</script>
by modifying Document Object Model (DOM) Environment. Persistend and NonPersistend https://github.com/Vereyon/HtmlRuleSanitizer Document and related objects allow to access contents of the page, modify elements etc. Most interaction with HTML is handled here.
Misconfiguration? -Is your application missing the proper security hardening across any part of the application stack? -Is any of your software out of date? This includes the OS, Web/App Server, DBMS, applications, and all code libraries? -Are any unnecessary features enabled or installed (e.g., ports, services, pages, accounts, privileges)? -Are default accounts and their passwords still enabled and unchanged? -Does your error handling reveal stack traces or other overly informative error messages to users? -Are the security settings in your development frameworks and libraries not set to secure values?(Plugins,Themes,) Then your Systems are at a higher risk. As a site administrator you should perform actions to eliminate those Risks.
is sensitive Is any of this data stored in clear text long term, including backups of this data? Is any of this data transmitted in clear text, internally or externally? Are any old / weak cryptographic algorithms used? Are weak crypto keys generated? Are any browser security directives or headers missing when sensitive data is provided by / sent to the browser? Example Attack Scenario A site simply doesn’t use SSL for all authenticated pages. Attacker simply monitors network traffic (in an open wireless network), and steals the user’s session cookie. Attacker then replays this cookie and hijacks the user’s session, accessing the user’s private data.
can simply change the url or Parameter to reach unauthorized functionality Always test actions and URLs when logged into an account with limited permissions, and verify that what this account has access to is correct. UnProTected Website Directories Google search can crawl unwanted urls and expose them to hackers User-agent: * Disallow: /feed/ Disallow: /trackback/ Disallow: /wp-admin/ Disallow: /wp-content/ Disallow: /wp-includes/ Disallow: /xmlrpc.php Disallow: /wp-
Click Attack CSRF occurs when an attacker can create a link and get a site administrator or someone with privileged access to click on that link which causes the site to take an action. For example, if an attacker was able to create a link that, when clicked on by a site admin, created a new ‘admin’ user with a known password, that would be a CSRF attack. The attacker would then simply have to find a way to fool the site admin into clicking that link to create a new admin user with a password they know. Social Engineering-->link to victim--> an attacker may trick the users of a web application into executing actions of the attacker's choosing.
Click Attack Transmits unauthorized commands from an (Infected)user that a website trusts (LogedAsAdmin) Credit: https://www.blackhat.com If the victim is an administrative account CSRF can compromise the entire web application.
-You are Open if using any vulnerable components or libraries. -Not all vulnerabilities are reported to a central clearinghouse. Stay UpToDate: http://cve.mitre.org/ - https://nvd.nist.gov/home.cfm Component vulnerabilities can cause almost any type of risk Ways to Protect: -Write your Own Hmmmmm not so realistic, so --fix the problem in the next version. Upgrading to these new versions is critical. The following two vulnerable components were downloaded 22m times in 2011. Apache CXF Authentication Bypass (services framework) Spring Remote Code Execution ( allowed attackers to execute arbitrary code effectively taking over the server).
cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Information can leak from a system through measurement of the time it takes to respond to certain queries. electromagnetic leaks Or Sound can provide an extra source of information, which can be exploited to break the system.
and can be done by using a program (HandsOn or Automated). This will try to decrypt your password by using a list of words, symbols and numbers (wordlists). The Attacker will try to compromize your website by brute force attacking to your wp-login.php
attacker is able to upload code to your website and execute it. When an attacker sends code to your web application and it is executed, granting the attacker access, they have exploited an RCE vulnerability. Object Injection attack A bug in a PHP application may accept user input and evaluate it as PHP code.
an image file Buffer overflow attack pdf, jpg, mp3, etc Your System & Your WordPress Website can compromized by opening a simple pdf? Ιntentionally execution Σκόπιμη εκτέλεση Unintentional execution Ακούσια Εκτέλεση WTF