SlideShare a Scribd company logo
1 of 7
Download to read offline
Help! My site has been hacked!
   How it happened, how to solve it and how to prevent it.
Hacker


                                                                                                                                                                                                                                                       How do hackers get in?
                                                                                                                                                                                                                                                       Hackers usually get in to your home directory
                                                                                                                                                                                                                                                       through an exploit in the installed software.

                                                                                                                                                                                                                                                       These exploits are often found in older software versions
                                                                                                                                                                                                                                                       and in old or ‘sketchy’ extensions.



Sket chy
 Extensions Deprecated
 Soft
 ware
                                                                                               ersion of
            e.g.
 a
 Photo

More Related Content

More from Byte

APMG juni 2014 - Regular Expression
APMG juni 2014 - Regular ExpressionAPMG juni 2014 - Regular Expression
APMG juni 2014 - Regular ExpressionByte
 
Hypernode Pitch @ Meet Magento 2014
Hypernode Pitch @ Meet Magento 2014Hypernode Pitch @ Meet Magento 2014
Hypernode Pitch @ Meet Magento 2014Byte
 
Joomladagen 2014 - Google Tag Manager
Joomladagen 2014 - Google Tag ManagerJoomladagen 2014 - Google Tag Manager
Joomladagen 2014 - Google Tag ManagerByte
 
Hexagonal Design - Maarten van Schaik
Hexagonal Design - Maarten van SchaikHexagonal Design - Maarten van Schaik
Hexagonal Design - Maarten van SchaikByte
 
Exception Handling in Python - Rik van Achterberg & Tim Muller
Exception Handling in Python - Rik van Achterberg & Tim MullerException Handling in Python - Rik van Achterberg & Tim Muller
Exception Handling in Python - Rik van Achterberg & Tim MullerByte
 
Presentatie MUG 27 juni 2013 - Graphite/New Relic
Presentatie MUG 27 juni 2013 - Graphite/New RelicPresentatie MUG 27 juni 2013 - Graphite/New Relic
Presentatie MUG 27 juni 2013 - Graphite/New RelicByte
 
Mm13 nl presentatie byte
Mm13 nl presentatie byteMm13 nl presentatie byte
Mm13 nl presentatie byteByte
 
Site gehacked... hoe op te lossen?
 Site gehacked... hoe op te lossen? Site gehacked... hoe op te lossen?
Site gehacked... hoe op te lossen?Byte
 
Varnish & Magento
Varnish & MagentoVarnish & Magento
Varnish & MagentoByte
 
Redis - Magento User Group
Redis - Magento User GroupRedis - Magento User Group
Redis - Magento User GroupByte
 
Byte hackpreventie
Byte hackpreventieByte hackpreventie
Byte hackpreventieByte
 
Magento Speed Analysis - Meet Magento 2012
Magento Speed Analysis - Meet Magento 2012Magento Speed Analysis - Meet Magento 2012
Magento Speed Analysis - Meet Magento 2012Byte
 
Hosting & Onderhoud Joomladagen 2012
Hosting & Onderhoud Joomladagen 2012Hosting & Onderhoud Joomladagen 2012
Hosting & Onderhoud Joomladagen 2012Byte
 
10 Joomla vragen - Joomladagen 2010
10 Joomla vragen - Joomladagen 201010 Joomla vragen - Joomladagen 2010
10 Joomla vragen - Joomladagen 2010Byte
 
Magento Hosting, Performance & Stabiliteit - Meet Magento 2011
Magento Hosting, Performance & Stabiliteit - Meet Magento 2011Magento Hosting, Performance & Stabiliteit - Meet Magento 2011
Magento Hosting, Performance & Stabiliteit - Meet Magento 2011Byte
 
Google analytics - Joomladagen2012
Google analytics - Joomladagen2012Google analytics - Joomladagen2012
Google analytics - Joomladagen2012Byte
 
Magento Mobile - Byte Seminar
Magento Mobile - Byte SeminarMagento Mobile - Byte Seminar
Magento Mobile - Byte SeminarByte
 

More from Byte (17)

APMG juni 2014 - Regular Expression
APMG juni 2014 - Regular ExpressionAPMG juni 2014 - Regular Expression
APMG juni 2014 - Regular Expression
 
Hypernode Pitch @ Meet Magento 2014
Hypernode Pitch @ Meet Magento 2014Hypernode Pitch @ Meet Magento 2014
Hypernode Pitch @ Meet Magento 2014
 
Joomladagen 2014 - Google Tag Manager
Joomladagen 2014 - Google Tag ManagerJoomladagen 2014 - Google Tag Manager
Joomladagen 2014 - Google Tag Manager
 
Hexagonal Design - Maarten van Schaik
Hexagonal Design - Maarten van SchaikHexagonal Design - Maarten van Schaik
Hexagonal Design - Maarten van Schaik
 
Exception Handling in Python - Rik van Achterberg & Tim Muller
Exception Handling in Python - Rik van Achterberg & Tim MullerException Handling in Python - Rik van Achterberg & Tim Muller
Exception Handling in Python - Rik van Achterberg & Tim Muller
 
Presentatie MUG 27 juni 2013 - Graphite/New Relic
Presentatie MUG 27 juni 2013 - Graphite/New RelicPresentatie MUG 27 juni 2013 - Graphite/New Relic
Presentatie MUG 27 juni 2013 - Graphite/New Relic
 
Mm13 nl presentatie byte
Mm13 nl presentatie byteMm13 nl presentatie byte
Mm13 nl presentatie byte
 
Site gehacked... hoe op te lossen?
 Site gehacked... hoe op te lossen? Site gehacked... hoe op te lossen?
Site gehacked... hoe op te lossen?
 
Varnish & Magento
Varnish & MagentoVarnish & Magento
Varnish & Magento
 
Redis - Magento User Group
Redis - Magento User GroupRedis - Magento User Group
Redis - Magento User Group
 
Byte hackpreventie
Byte hackpreventieByte hackpreventie
Byte hackpreventie
 
Magento Speed Analysis - Meet Magento 2012
Magento Speed Analysis - Meet Magento 2012Magento Speed Analysis - Meet Magento 2012
Magento Speed Analysis - Meet Magento 2012
 
Hosting & Onderhoud Joomladagen 2012
Hosting & Onderhoud Joomladagen 2012Hosting & Onderhoud Joomladagen 2012
Hosting & Onderhoud Joomladagen 2012
 
10 Joomla vragen - Joomladagen 2010
10 Joomla vragen - Joomladagen 201010 Joomla vragen - Joomladagen 2010
10 Joomla vragen - Joomladagen 2010
 
Magento Hosting, Performance & Stabiliteit - Meet Magento 2011
Magento Hosting, Performance & Stabiliteit - Meet Magento 2011Magento Hosting, Performance & Stabiliteit - Meet Magento 2011
Magento Hosting, Performance & Stabiliteit - Meet Magento 2011
 
Google analytics - Joomladagen2012
Google analytics - Joomladagen2012Google analytics - Joomladagen2012
Google analytics - Joomladagen2012
 
Magento Mobile - Byte Seminar
Magento Mobile - Byte SeminarMagento Mobile - Byte Seminar
Magento Mobile - Byte Seminar
 

Help! My site has been hacked!

  • 1. Help! My site has been hacked! How it happened, how to solve it and how to prevent it.
  • 2. Hacker How do hackers get in? Hackers usually get in to your home directory through an exploit in the installed software. These exploits are often found in older software versions and in old or ‘sketchy’ extensions. Sket chy
  • 5.  ware ersion of e.g.
  • 6.  a
  • 8.  Album e.g.
  • 10.  old
  • 11.  v Joomla
  • 12.  or
  • 14. Burglar (the
  • 15.  hacker) Depict it as your home If you forget to close your garage door or a window, a burglar has an easy way of getting into your home. In older software versions, the developers sometimes unknowingly leave a door or a window open. In some cases, malicious developers do this intentionally: think of it as someone sketchy building your garage (the extension), and keeping a key to the garage door for themselves, allowing them to secretly enter your home. The
  • 16.  garage The
  • 18.  extension) (the
  • 20. Muhaha! Burgled (hacked) Through these open doors and windows, a burglar can freely enter your home and cause all kinds of trouble: like stealing your belonings or tearing the place apart. The
  • 21.  garage The
  • 23.  extension) (the
  • 25. Exploit Scripts How hackers work Your
  • 26.  files Like burglars accessing your house through an open on
  • 27.  the
  • 28.  server window, hackers can access your home directory through an exploit in the installed software. Once in, they typically use malicious scripts (exploit scripts) to: - Steal data (e.g. from your customers) - Send thousands of spam mails in your name - Place unwanted images and text onto your website - Attack other servers from your website (DOS) Sket chy
  • 31.  ware ersion of e.g.
  • 32.  a
  • 34.  Album e.g.
  • 35.  an
  • 36.  old
  • 37.  v Joomla
  • 38.  or
  • 40. Exploit Scripts What can you do about it? Your
  • 41.  files Deny hackers access on
  • 42.  the
  • 43.  server To prevent hackers from gaining access, all exploits (the open windows and doors) must be closed. Make sure to update all installed software and extensions and remove the ones you don’t trust. Remove the malicious scripts It’s possible that hackers still have access or steal data through installed exploit scripts. These will have to be removed as well. Sketchy
  • 47.  of e.g.
  • 48.  a
  • 50.  Album e.g.
  • 51.  an
  • 52.  o Joomla
  • 53.  or
  • 55. Gmblz... Keep hackers out. Update your software regularly. For more information about solving and preventing hacks, go to: www.byte.nl/hackpreventie (Dutch)