Tim Butler: Post-Mortem of a Hacked Website

Continue the discussion

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


December 21, 2016

This talk offers an insight into the methods we use at Conetix to determine the root cause of a hacked website. This will include examples of some of the more common exploits seen and what they look like in the log files.

Determining the root cause is important in order to ensure you’ve blocked the hacker from returning. Finally, some tips in order to greatly reduce the chances of the site being hacked in the first place. Developers through to businesses will hopefully see not only the importance of keeping a secure site, but what needs to be done when it’s too late.

Presentation Slides »

Rate this:


WordCamp Sunshine Coast 2016 21


Tim Butler 1


Hacked 4


English 5622

MP4: Low, Med, High
OGG: Low
Subtitle this video →
%d bloggers like this: