Michael Veenstra: The Anatomy Of A Hacked Site

Continue the discussion

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


February 26, 2018

In this talk, I discuss the roadmap of a typical WordPress site getting “hacked”. From start to finish, we look at how victims can be identified, how sites are breached, how persistent backdoors are established, and how the attackers will exploit the compromised site.

I avoid getting too overtly technical in my descriptions, instead opting to focus on the mindset and overall process of the attack. This enables less-technical website owners to get a stronger conceptual grasp of what exactly goes on during a breach.

It can be overwhelming for inexperienced webmasters to adequately defend against a threat they don’t understand. This talk defines these threats in a concrete way, which is much more compelling than the nebulous concept of “hackers” in general. Viewers leave the room empowered to take a proactive outlook on the security of their web presence.

Rate this:


WordCamp Phoenix 2018 25


Michael Veenstra 1


Hacked 8


English 6224

MP4: Low, Med, High
OGG: Low
Subtitle this video →
%d bloggers like this: