Tim Butler: Post-Mortem of a Hacked Website

Continue the discussion

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Published

December 21, 2016

This talk offers an insight into the methods we use at Conetix to determine the root cause of a hacked website. This will include examples of some of the more common exploits seen and what they look like in the log files.

Determining the root cause is important in order to ensure you’ve blocked the hacker from returning. Finally, some tips in order to greatly reduce the chances of the site being hacked in the first place. Developers through to businesses will hopefully see not only the importance of keeping a secure site, but what needs to be done when it’s too late.

Presentation Slides »

Rate this:

Event

WordCamp Sunshine Coast 2016 21

Speakers

Tim Butler 1

Tags

Hacked 2

Language

English 5292

Download
MP4: Low, Med, High
OGG: Low
Subtitles
Subtitle this video →
Producer
%d bloggers like this: