<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Webmaster-Source &#187; Security</title>
	<atom:link href="https://www.webmaster-source.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.webmaster-source.com</link>
	<description>Useful Resources For Webmasters</description>
	<lastBuildDate>Thu, 24 Aug 2017 02:01:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.42</generator>
	<item>
		<title>What You Need to Know About the Heartbleed Bug</title>
		<link>https://www.webmaster-source.com/2014/04/14/what-you-need-to-know-about-the-heartbleed-bug/</link>
		<comments>https://www.webmaster-source.com/2014/04/14/what-you-need-to-know-about-the-heartbleed-bug/#comments</comments>
		<pubDate>Mon, 14 Apr 2014 23:07:17 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[SSL]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=5289</guid>
		<description><![CDATA[If you haven&#8217;t already heard, a major exploit in OpenSSL was discovered recently. The Heartbleed Bug, which is as scary as it sounds, allows an attacker to capture potentially sensitive information from a server&#8217;s memory by exploiting a flaw in the implementation of the heartbeat function of OpenSSL&#8217;s SSL/TLS implementation. How it Works SSL/TLS, the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img style=' float: right; padding: 4px; margin: 0 0 2px 7px;'  class="alignright size-full wp-image-5290" alt="Heartbleed Logo" src="//www.webmaster-source.com/wp-content/uploads/2014/04/heartbleedbug.png" width="165" height="200" />If you haven&#8217;t already heard, a major exploit in OpenSSL was discovered recently. The <a href="http://heartbleed.com/">Heartbleed Bug</a>, which is as scary as it sounds, allows an attacker to capture potentially sensitive information from a server&#8217;s memory by exploiting a flaw in the implementation of the heartbeat function of OpenSSL&#8217;s SSL/TLS implementation.</p>
<h3>How it Works</h3>
<p>SSL/TLS, the encryption protocol commonly used for securing traffic between web browsers and servers, has a feature called a &#8220;heartbeat.&#8221; Every now and then, an exchange like this happens between the client and the server:</p>
<p><strong>Client:</strong> You still there? If so, send back &#8220;ALIVE,&#8221; which is five characters.</p>
<p><strong>Server:</strong> ALIVE</p>
<p>If the heartbeat succeeds, the connection stays open. This keeps happening, over and over, with a different value being passed each time.</p>
<p>Now here&#8217;s what happens if someone exploits the Heartbleed bug:</p>
<p><strong>Client:</strong> You still there? If so, send back &#8220;KITTEN,&#8221; which is 300 characters.</p>
<p><strong>Server</strong>: KITTEN, and here&#8217;s a block of random memory from RAM!</p>
<p>In this manner, an attacker can get a random 64KB chunk of data from memory <em>every time</em> a heartbeat is sent, thanks to a lack of validation of the length parameter. (So an attacker can just repeatedly make attempts.) Eventually, they&#8217;d get lucky and find something interesting. Such as the SSL certificate or users&#8217; passwords and data.</p>
<p>Exploiting this bug is trivial. (There were people posting scripts to test for the vulnerability minutes after it was announced. Just imagine how quickly malicious types got to work implementing exploits for the bug!) It&#8217;s also possible that <em>someone</em> knew about it months or even a couple years ago, and has been exploiting it ever since. <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html">Bloomberg even suggests</a> that the NSA has known about it for two years, and has been exploiting it rather than disclosing the problem.</p>
<h3>Is it Fixed?</h3>
<p>Yes! Your Linux distro should already have patched builds in their package manager, so it&#8217;s just a simple manner of running a couple of commands to update your <code>openssl</code> and <code>libssl1.0.0</code> packages, then restarting any services that depend on SSL. (Or just do a full reboot if you&#8217;re paranoid.) In the case of Ubuntu, you&#8217;d just do something like this to update the packages:</p>
<pre class="brush: plain; title: ; notranslate">
sudo apt-get update
sudo apt-get dist-upgrade
</pre>
<p>You should now revoke any SSL certificates and issue new ones, in case they were leaked in an exploit of the bug.</p>
<h3>What Should I Do, as a User?</h3>
<p>Change your passwords! For anything important—email, banking, etc.—you should consider picking a new password.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2014/04/14/what-you-need-to-know-about-the-heartbleed-bug/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>WordPress Security Advisory: Harden Your Admin Login</title>
		<link>https://www.webmaster-source.com/2013/04/24/wordpress-security-advisory-harden-your-admin-login/</link>
		<comments>https://www.webmaster-source.com/2013/04/24/wordpress-security-advisory-harden-your-admin-login/#comments</comments>
		<pubDate>Wed, 24 Apr 2013 11:58:00 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[WordPress]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=5075</guid>
		<description><![CDATA[There has been news lately of a distributed attack against WordPress sites. A growing botnet has been running dictionary attacks against sites powered by WordPress, in effort to gain access to the the admin panel and infect the server. As is usually the case with botnets, infected servers are assimilated into the pool of compromised [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img style=' float: right; padding: 4px; margin: 0 0 2px 7px;'  class="alignright size-full wp-image-5065" alt="WordPress" src="//www.webmaster-source.com/wp-content/uploads/2013/04/wordpress-logo-type.png" width="249" height="57" />There has been news lately of <a href="http://arstechnica.com/security/2013/04/huge-attack-on-wordpress-sites-could-spawn-never-before-seen-super-botnet/">a distributed attack against WordPress sites</a>. A growing <a href="http://en.wikipedia.org/wiki/Botnet">botnet</a> has been running <a href="http://en.wikipedia.org/wiki/Dictionary_attack">dictionary attacks</a> against sites powered by WordPress, in effort to gain access to the the admin panel and infect the server. As is usually the case with botnets, infected servers are assimilated into the pool of compromised systems that make up the botnet and put to use for nefarious purposes such as DDoS attacks.</p>
<p>It&#8217;s important to note that this is <em>not</em> a WordPress security flaw, but rather an attempt to systematically guess passwords.</p>
<p>The attacks consist of simple POST requests to <code>wp-login.php</code> with a supplied username of <code>admin</code> and one of many simple, insecure passwords. I&#8217;ve noticed plenty in my logs, including <code>rainydays</code>, <code>sophie1</code>, and <code>wordpress</code>. The requests come from a rotation of IP addresses in the botnet, making it difficult to block them outright.</p>
<p>It&#8217;s easy enough to protect yourself from the attacks, providing you follow some simple best practices.</p>
<h3>1. Get Rid of the Admin User</h3>
<p>Historically, every WordPress installation would come with an administrative user named <code>admin</code>, which was created during the setup process. In more recent versions, the setup screen prompts you to choose your own username instead of providing a default. Check the Users screen in your WordPress backend to see if a user named <code>admin</code> exists. If it does, you should replace it with a profile that has a unique name, ensuring that the new account has administrative privileges.</p>
<p>Having a user account with that default name is a bad idea, because numerous attacks over the years have operated under the assumption that the operators of many WordPress sites will have been too lazy to change it. The current attack only tries passwords for a user named <code>admin</code>, as well, so ensuring that such a user does not exist will go a long way toward protecting your site.<span id="more-5075"></span></p>
<h3>2. Set a Strong Password</h3>
<p>What&#8217;s the common theme among these passwords?</p>
<ul>
<li>sophie1</li>
<li>rainydays</li>
<li>roberts</li>
<li>online</li>
<li>onions</li>
</ul>
<p>They&#8217;re all incredibly simple and insecure, and they&#8217;re all ones that were tried right here on Webmaster-Source recently. Obviously you want to avoid passwords like those if you want to avoid being compromised.</p>
<p>For a basic, reasonably strong password, your password should:</p>
<ul>
<li>Be at least eight characters long</li>
<li>Have a mixture of upper and lower case letters</li>
<li>Contain numbers and non-alphanumeric symbols</li>
</ul>
<p>An easy way to create something secure and memorable is to pick a phrase that means something to you and use the first letter of each word, mixing up the case and adding some numbers and symbols. For example, &#8220;The Wheel of Time turns and Ages come and pass&#8221; would become <code>TWoTtaAc&amp;p13</code>. Complex, yet still possible to remember.</p>
<p>Or you could go with <a href="http://xkcd.com/936/">the XKCD method</a> and pick four random, unrelated words and use them as your pass<em>phrase</em>. (e.g. &#8220;double pizza kitten book.&#8221;) As the comic explains, such a password can actually be <em>more</em> secure against a brute-force attack, and is far easier to remember than a conventional password.</p>
<h3>3. Block the Bots</h3>
<p>Install a plugin like <a href="http://wordpress.org/extend/plugins/bad-behavior/">Bad Behavior</a> (which will also help cut down on spam comments) or <a href="http://wordpress.org/extend/plugins/limit-login-attempts/">Limit Login Attempts</a>. Both plugins attempt to hinder bot activity, though through different means. Bad Behavior detects suspicious requests and blocks them, optionally using the <a href="http://www.projecthoneypot.org/">Project Honeypot</a> database to improve its effectiveness. Limit Login Attempts will block IP addresses if they continually make incorrect login attempts.</p>
<h3>4. CloudFlare</h3>
<p><a href="https://www.cloudflare.com/">CloudFlare</a> is an interesting service that speeds up your site and mitigates security threats by sitting between the user and your server. You update your domain to point to their servers, and they act similarly to a CDN, caching your site and analyzing the incoming traffic. If you&#8217;re running off a cheap shared hosting plan, it could make a significant improvement to your loading speed. I don&#8217;t use their services personally, but they&#8217;ve been instrumental in mitigating DDoS attacks and traffic spikes for some high-profile sites, and they&#8217;re <a href="http://blog.cloudflare.com/patching-the-internet-fixing-the-wordpress-br">on top of</a> the current WordPress threat.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2013/04/24/wordpress-security-advisory-harden-your-admin-login/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>FillDisk Proof-of-Concept Demonstrates Flaw in Browsers&#8217; localStorage Implementations</title>
		<link>https://www.webmaster-source.com/2013/03/06/filldisk-proof-of-concept-demonstrates-flaw-in-browsers-localstorage-implementations/</link>
		<comments>https://www.webmaster-source.com/2013/03/06/filldisk-proof-of-concept-demonstrates-flaw-in-browsers-localstorage-implementations/#comments</comments>
		<pubDate>Wed, 06 Mar 2013 11:37:57 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[Software & Scripts]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[HTML5]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=5029</guid>
		<description><![CDATA[HTML5&#8217;s localStorage API makes it possible for a web page to store 5-10MB of persistent data, much like cookies, but for more complex data—as you probably already know if you&#8217;re familiar with HTML5&#8217;s fancy new APIs. Feross Aboukhadijeh came up with an interesting and relevant proof-of-concept that&#8217;s been making its rounds on the internet: a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>HTML5&#8217;s localStorage API makes it possible for a web page to store 5-10MB of persistent data, much like cookies, but for more complex data—as you probably already know if you&#8217;re familiar with HTML5&#8217;s fancy new APIs. Feross Aboukhadijeh came up with an interesting and relevant proof-of-concept that&#8217;s been making its rounds on the internet: <a href="http://feross.org/fill-disk/">a little something called FillDisk.</a></p>
<p>Apparently Chrome, Safari, Internet Explorer and Opera all have a flaw in their localStorage implementations that allow a website to use a little trick to fill your hard disk up. They allow each subdomain of an origin to have its own storage pool, so you can bypass the quota by looping around and storing data for tons of subdomains. FillDisk manages 1GB per 16 seconds on the author&#8217;s MacBook Pro. Firefox gets it right and sets the quota for the entire second-level domain.</p>
<p>Now Mozilla&#8217;s solution doesn&#8217;t exactly seem optimal to me. There are plenty of sites that allow users to host things on subdomains, GitHub Pages being a noteworthy example. It seems to me that a more equitable solution is to extend the partial solution Firefox implements and prompt the user to allow the pool to be enlarged when needed.</p>
<p><a href="http://feross.org/fill-disk/">Introducing the HTML5 Hard Disk Filler™ API</a> [Feross.org]</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2013/03/06/filldisk-proof-of-concept-demonstrates-flaw-in-browsers-localstorage-implementations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Proposed Secure Password Hashing API in PHP 5.5</title>
		<link>https://www.webmaster-source.com/2012/10/17/proposed-secure-password-hashing-api-in-php-5-5/</link>
		<comments>https://www.webmaster-source.com/2012/10/17/proposed-secure-password-hashing-api-in-php-5-5/#comments</comments>
		<pubDate>Wed, 17 Oct 2012 11:20:05 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=4846</guid>
		<description><![CDATA[PHP 5.5 will be gaining a simpler and more newbie-friendly way to securely hash passwords. As those who are active in the PHP community are all to well aware of, it is quite a trial to educate everyone on properly securing passwords in their applications. Even large web companies are routinely outed for their lax [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>PHP 5.5 will be gaining a simpler and more newbie-friendly way to securely hash passwords. As those who are active in the PHP community are all to well aware of, it is quite a trial to educate everyone on <a href="http://www.webmaster-source.com/2012/09/04/6-articles-you-should-read-before-storing-users-passwords/">properly securing passwords</a> in their applications. Even large web companies are routinely outed for their lax measures. Sometimes they&#8217;re stored in plain text and sometimes they might as well be, like when weak MD5 or SHA1 hashes are used. Remember the big scandal when Gawker Media&#8217;s database of user passwords was leaked, and the weak hashes were solved within days? Or more recently, <a href="https://plus.google.com/116797686750161798768/posts/NGV5xQwJywf">when it was discovered</a> that Pandora not only stored your password in cleartext, but transmitted it that way as well? It seems that at least two well-known websites have a similar &#8220;facepalm&#8221; moment every year.</p>
<p>The PHP contributors want to help combat this problem—at least among companies using PHP, obviously the issue is by no means limited to PHP developers—with the new API. A couple of simple functions that even the most novice of developers can use will automatically take care of the hashing using bcrypt with a reasonable work factor.</p>
<p>The proposed syntax is something like this:</p>
<pre class="brush: php; title: ; notranslate">
//hashing a new password
$hash = password_hash($password_entered);

//Checking a password
if (password_verify($password_entered, $hash_from_database)) {
    //password is valid if password_verify() returns true
}
</pre>
<p>For compatibility with versions of PHP prior to 5.5, you can even download <a href="https://github.com/ircmaxell/password_compat">a PHP implementation</a> that will automatically be disabled in a PHP 5.5 environment.</p>
<p><a href="https://gist.github.com/3707231">The new Secure Password Hashing API in PHP 5.5</a> [GitHub]</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2012/10/17/proposed-secure-password-hashing-api-in-php-5-5/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Pandora Password Debacle</title>
		<link>https://www.webmaster-source.com/2012/09/25/pandora-password-debacle/</link>
		<comments>https://www.webmaster-source.com/2012/09/25/pandora-password-debacle/#comments</comments>
		<pubDate>Tue, 25 Sep 2012 10:51:34 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[Coding]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=4848</guid>
		<description><![CDATA[There&#8217;s a post going around on Google Plus that shows off a glaring security hole in the popular internet radio site Pandora. If you use FireBug (or the HTML inspection tool in your browser of choice), you can see that the Password field on the account settings page clearly shows your password in the value [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img style=' float: right; padding: 4px; margin: 0 0 2px 7px;'  class="alignright  wp-image-4849 imgborder" title="Pandora's plaintext password faux pas" src="//www.webmaster-source.com/wp-content/uploads/2012/09/pandora-plaintext.png" alt="" width="310" height="65" />There&#8217;s a post going around on Google Plus that <a href="https://plus.google.com/116797686750161798768/posts/NGV5xQwJywf">shows off a glaring security hole</a> in the popular internet radio site <a href="http://www.pandora.com/">Pandora</a>. If you use FireBug (or the HTML inspection tool in your browser of choice), you can see that the Password field on the account settings page clearly shows your password in the value attribute. It displays bullets because it&#8217;s a password type form field instead of a plain input, but the password is still right there.</p>
<p>That&#8217;s<em></em> not good, however you look at it. While updates to the post explain that it&#8217;s not necessarily indicative that Pandora is storing passwords in their database in plaintext—they could just be caching them client-side—it&#8217;s definitely in the realm of possibility. Not using a slow one-way hash and this sort of thing tend to go hand in hand.</p>
<p>Given that I was able to see my password, on a new computer I had yet to use Pandora on, with a browser that I had recently cleared of cookies and other local storage, Pandora is most likely storing passwords in plaintext and transmitting them over the internet. (Or, at best, using a two-way encryption scheme, which is little better.)</p>
<p><a href="https://plus.google.com/116797686750161798768/posts/NGV5xQwJywf">Pandora doesn&#8217;t one-way hash their passwords</a> [Google Plus]</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2012/09/25/pandora-password-debacle/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WordPress Admins Can Post JavaScript in Post Comments</title>
		<link>https://www.webmaster-source.com/2011/08/31/wordpress-admins-can-post-javascript-in-post-comments/</link>
		<comments>https://www.webmaster-source.com/2011/08/31/wordpress-admins-can-post-javascript-in-post-comments/#comments</comments>
		<pubDate>Wed, 31 Aug 2011 11:59:40 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[WordPress]]></category>
		<category><![CDATA[javascript]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=4278</guid>
		<description><![CDATA[Here&#8217;s an interesting fact about WordPress: users with Administrator or Editor privileges are allowed to post unsanitized JavaScript or markup in Post comments. I discovered this by accident when I was leaving a Facebook API example for a commentator, and posted a code snippet that included the &#60;script&#62; tag referencing http://connect.facebook.net/en_US/all.js#xfbml=1. To my surprise, a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Here&#8217;s an interesting fact about WordPress: users with Administrator or Editor privileges are allowed to post unsanitized JavaScript or markup in Post comments.</p>
<p>I discovered this by accident when I was leaving a Facebook API example for a commentator, and posted a code snippet that included the <code>&lt;script&gt;</code> tag referencing <code>http://connect.facebook.net/en_US/all.js#xfbml=1</code>. To my surprise, a <a href="http://developers.facebook.com/docs/reference/plugins/comments/">Facebook Comments</a> widget appeared within my comment!</p>
<p>I did some testing with a fresh WordPress installation and ensured that it wasn&#8217;t related to any of my own customizations or installed plugins, and that only high-ranking user accounts could do it.</p>
<p>This could potentially be a <a href="http://en.wikipedia.org/wiki/Cross-site_scripting">Cross-Site Scripting</a> (XSS) vulnerability, as a user with Editor privileges could conceivably &#8220;go rogue&#8221; and post malicious JavaScript in comment threads. This could be used for any number of nefarious things, such as injecting a malware loader into the page or inserting spam links.</p>
<p>So I did some digging, wondering whether I should report the issue to the core developers, and found <a href="http://codex.wordpress.org/FAQ_Security#Why_are_there_path_disclosures_when_directly_loading_certain_files.3F">this</a>:</p>
<blockquote><p>Users with Administrator or Editor privileges are allowed to publish unfiltered HTML in post titles, post content, and comments. WordPress is, after all, a publishing tool, and people need to be able to include whatever markup they need to communicate. Users with lesser privileges are not allowed to post unfiltered content.</p>
<p>[&#8230;] Regardless, an Administrator has wide-ranging super powers among which unfiltered HTML is a lesser one.</p>
<p>In WordPress multisite, only super administrators can publish unfiltered HTML, as all other users are considered untrusted.</p></blockquote>
<p>It makes sense that Administrators be able to do that, as they have unfettered control over everything else. (And there are probably some cool things you could do by inserting JavaScript into your comments, like placing polls without having to use a plugin.)</p>
<p>So, the lesson here is to be cautious with who you assign Editor privileges to. If you don&#8217;t trust them, don&#8217;t give them an Editor account. Besides, a rogue Editor could play havoc on posts and comments even without being able to paste-in malicious code. <img src="https://www.webmaster-source.com/wp-includes/images/smilies/icon_wink.gif" alt=";)" class="wp-smiley" /></p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2011/08/31/wordpress-admins-can-post-javascript-in-post-comments/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What Everyone Missed About the Gawker Password Scandal</title>
		<link>https://www.webmaster-source.com/2011/01/10/what-everyone-missed-about-the-gawker-password-scandal/</link>
		<comments>https://www.webmaster-source.com/2011/01/10/what-everyone-missed-about-the-gawker-password-scandal/#comments</comments>
		<pubDate>Mon, 10 Jan 2011 11:41:55 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=3815</guid>
		<description><![CDATA[A few weeks ago the internet exploded with news about the servers that host the Gawker blogs (Gizmodo, Lifehacker, Jezebel, etc.) being compromised by a distributed group of crackers known as Gnosis. Though the attack itself was covered fairly well by various tech publications (and less so by the traditional media, as usual), there was [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A few weeks ago the internet exploded with news about the servers that host the Gawker blogs (Gizmodo, Lifehacker, Jezebel, etc.) being compromised by a distributed group of crackers known as Gnosis. Though the attack itself was covered fairly well by various tech publications (and less so by the traditional media, as usual), there was a recurring theme that just seems <em>wrong</em>&#8230;</p>
<p>Many people commenting on the subject, whether in editorials, podcasts or discussion forums, would bring up the subject of how strong the users&#8217; cracked passwords were. There were a large percentage of users with weak passwords like <em>qwerty, password, 123456,</em> or <em>monkey.</em> Yes, they are obviously weak passwords. However, I think it&#8217;s wrong to use them as an example of bad user-end security practices.</p>
<p>I, for one, would never use one of my more secure passwords for an account on a blog or discussion forum. I would be likely to come up with a throwaway that I would never use on a site where I would care if it were compromised. Considering that Gawker&#8217;s readers are probably a <em>little</em> more tech-savvy than your grandparents, why assume that they wouldn&#8217;t take the same approach? Given Gawker&#8217;s security breach, I think it&#8217;s a well-justified method to use.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2011/01/10/what-everyone-missed-about-the-gawker-password-scandal/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>FireSheep: Grey Hat Security?</title>
		<link>https://www.webmaster-source.com/2010/11/08/firesheep-grey-hat-security/</link>
		<comments>https://www.webmaster-source.com/2010/11/08/firesheep-grey-hat-security/#comments</comments>
		<pubDate>Mon, 08 Nov 2010 11:23:56 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=3698</guid>
		<description><![CDATA[A scary new Firefox extension known as Firesheep came onto the scene recently. For years it has been possible for nefarious users to &#8220;sniff&#8221; unencrypted network packets for session cookies, allowing them to, with a bit of work, hijack your session with a website. This would enable them full access to, say, your email or [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A scary new Firefox extension known as <a href="http://codebutler.com/firesheep">Firesheep</a> came onto the scene recently. For years it has been possible for nefarious users to &#8220;sniff&#8221; unencrypted network packets for session cookies, allowing them to, with a bit of work, hijack your session with a website. This would enable them full access to, say, your email or Facebook account until you log out and destroy the session. This is probably the biggest security risk on a public WiFi hotspot, though until now it was fairly unlikely that you would happen to be on the same network as a nefarious user with the technical chops to pull it off. Until now.</p>
<p><img style=' float: right; padding: 4px; margin: 0 0 2px 7px;'  class="alignright size-full wp-image-3699 imgborder" title="Firesheep Sidebar" src="//www.webmaster-source.com/wp-content/uploads/firesheep-sidebar.jpg" alt="" width="229" height="195" />Firesheep is a proof of concept that attempts to demonstrate just how big of a problem popular websites&#8217; lack of HTTPS support is&#8230;by making &#8220;sidejacking&#8221; point-and-click simple. Anyone can install the extension, press a button to automatically scan for active sessions of popular websites being transmitted over the network, and then click on an entry to log in to the user&#8217;s account on the website.</p>
<p>What started out as a fairly innocent project demonstrate to websites like Facebook that they should be implementing SSL encryption has become a major security risk. Firesheep has sort of&#8230;went viral. A frightening number of people have downloaded the extension.</p>
<p>While developer Eric Butler&#8217;s intentions may have been honorable, his extension has had one very negative effect: <strong>it has made sidejacking much, much more prevalent.</strong> A year ago, I could be fairly sure that nobody on the local McDonalds&#8217; WiFi hotspot would be trying to hijack my Twitter session. After all, I live in a fairly rural state with a low density of exceptionally computer-literate people. Now, some kid could be playing around with Firesheep.</p>
<p>This reminds me of the <a href="http://en.wikipedia.org/wiki/Grey_hat">&#8220;grey hat&#8221;</a> security researchers. They usually don&#8217;t have malicious intentions, but their methods can sometimes cause more harm than good. That seems to be Firesheep in a nutshell. Butler&#8217;s follow-up blog posts even read like those of a grey hat hacker.</p>
<p>I think Firesheep is the worst kind of way to promote security. It has done far more harm than good. Sidejacking <em>was</em> a fringe thing that you didn&#8217;t really have to worry about, except for higher-risk things like banking or checking your email. Now <em>anyone</em> can install a GUI tool and do it without even knowing how it works. This is going beyond enabling <a href="http://en.wikipedia.org/wiki/Script_kiddie">script kiddies</a>. It puts cracker tools in the hands of the masses, therefore <em>making</em> sidejacking an actual risk.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2010/11/08/firesheep-grey-hat-security/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>WordPress Administration Over SSL</title>
		<link>https://www.webmaster-source.com/2010/07/16/wordpress-administration-over-ssl/</link>
		<comments>https://www.webmaster-source.com/2010/07/16/wordpress-administration-over-ssl/#comments</comments>
		<pubDate>Fri, 16 Jul 2010 11:56:32 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[WordPress]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=3461</guid>
		<description><![CDATA[Do you frequently log-in to your WordPress install over public WiFi networks? While it may seem like paranoia to some people, it&#8217;s really not a good idea to log into important sites over an unencrypted connection. There&#8217;s always a possibility that someone could be packet sniffing. If you run a high-profile blog, you might want [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Do you frequently log-in to your WordPress install over public WiFi networks? While it may seem like paranoia to some people, it&#8217;s really not a good idea to log into important sites over an unencrypted connection. There&#8217;s always a possibility that someone could be <a href="http://en.wikipedia.org/wiki/Packet_sniffing">packet sniffing</a>. If you run a high-profile blog, you might want to consider acquiring an SSL certificate. (A certificate is a sort of public key used to establish an encrypted connection.) With a certificate, you can log into WordPress with an HTTPS connection. This encrypts traffic between you and your server, making it impossible for anybody to intercept your password while you work from a café.</p>
<p>It&#8217;s a bit of a pain to set up SSL, but many web hosts will do it for you. WPWebHost, for instance, will configure SSL for you if you get a certificate. They run around $89/year (I know, what a racket&#8230;) from most certificate authorities, and some hosts will charge a small set-up fee. VPS.net, on the other hand, has a deal with Comodo where you can get a free SSL certificate as long as you are hosted by them. You have to set everything up on your own, though.</p>
<p>What do you do once you have a security certificate? There&#8217;s a <a href="http://codex.wordpress.org/Administration_Over_SSL">Codex article on the subject</a>. There are a couple of WordPress constants in wp-config.php that you can toggle on to force everything in the /wp-admin directory to be served over HTTPS, the login page most importantly.</p>
<p>You probably won&#8217;t ever have to worry about this, unless you run a very large blog or you like to work from a coffee shop across the street from a computer security convention. WordPress.com users are lucky; they can just go to <code>http<strong>s</strong>://wordpress.com/wp-login.php</code> to log in securely.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2010/07/16/wordpress-administration-over-ssl/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>It&#8217;s a Hosting Issue, Not a WordPress One</title>
		<link>https://www.webmaster-source.com/2010/04/16/its-a-hosting-issue-not-a-wordpress-one/</link>
		<comments>https://www.webmaster-source.com/2010/04/16/its-a-hosting-issue-not-a-wordpress-one/#comments</comments>
		<pubDate>Fri, 16 Apr 2010 11:20:28 +0000</pubDate>
		<dc:creator><![CDATA[Matt]]></dc:creator>
				<category><![CDATA[WordPress]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.webmaster-source.com/?p=3225</guid>
		<description><![CDATA[There has been some misinformation going around about an alleged security vulnerability in WordPress 2.9.2. A bunch of websites were recently compromised, and some people have tried to assign the blame to WordPress. The issue, however, comes from shared web hosts not taking the proper precautions to prevent users from accessing configuration files they shouldn&#8217;t [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>There has been some misinformation going around about an alleged security vulnerability in WordPress 2.9.2. A bunch of websites were recently compromised, and some people have tried to assign the blame to WordPress. The issue, however, comes from shared web hosts not taking the proper precautions to prevent users from accessing configuration files they shouldn&#8217;t have filesystem permissions for.</p>
<p>The exploit, in essence, involves capturing a WordPress blog&#8217;s database details from wp-config.php by having a hosting account on the same server, and building malicious script to open files outside of the zone that should be permissible. (Think along the lines of <em>../../other_users_files/wp-config.php</em>.)</p>
<p>Some misinformed publications are claiming that it&#8217;s a WordPress vulnerability stemming from wp-config.php&#8217;s plain-text storage of  database passwords&#8230;something that <em>every</em> database-using script has to do in order to function. Any reversible encryption scheme is just as easily reversible by someone who can access you filesystem, and the one-way hashing used for users&#8217; passwords doesn&#8217;t work in this sort of situation. The file should never be directly accessibly by anyone other than the  creator on a properly-configured server.</p>
<p>A new post on the WordPress development blog is <a href="http://wordpress.org/development/2010/04/file-permissions/">attempting to clear-up the misunderstanding</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.webmaster-source.com/2010/04/16/its-a-hosting-issue-not-a-wordpress-one/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: www.webmaster-source.com @ 2026-04-29 11:41:08 by W3 Total Cache
-->