Michael Veenstra: The Anatomy Of A Hacked Site

Continue the discussion

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Published

February 26, 2018

In this talk, I discuss the roadmap of a typical WordPress site getting “hacked”. From start to finish, we look at how victims can be identified, how sites are breached, how persistent backdoors are established, and how the attackers will exploit the compromised site.

I avoid getting too overtly technical in my descriptions, instead opting to focus on the mindset and overall process of the attack. This enables less-technical website owners to get a stronger conceptual grasp of what exactly goes on during a breach.

It can be overwhelming for inexperienced webmasters to adequately defend against a threat they don’t understand. This talk defines these threats in a concrete way, which is much more compelling than the nebulous concept of “hackers” in general. Viewers leave the room empowered to take a proactive outlook on the security of their web presence.

Rate this:

Event

WordCamp Phoenix 2018 25

Speakers

Michael Veenstra 1

Tags

Hacked 10

Language

English 6885

Download
MP4: Low, Med, High
OGG: Low
Subtitles
Subtitle this video →
Producer
%d bloggers like this: