Skip to content

Commit 582fba3

Browse files
committed
grammer fixes
1 parent 222d2a5 commit 582fba3

File tree

6 files changed

+22
-24
lines changed

6 files changed

+22
-24
lines changed

Tales.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ <h2>Michael Hess</h2>
6161
</p>
6262

6363
<p>
64-
Solutions architect lead at the University of Michigan.
64+
Senior technologist at the University of Michigan.
6565
</p>
6666

6767
<p>
@@ -85,7 +85,7 @@ <h2>Agenda</h2>
8585

8686
<p>The tale of the unexplained hack </p>
8787

88-
<p>The tale of the we have heard many times</p>
88+
<p>The tale of we have heard many times</p>
8989

9090
<p>Overview of Drupal security and the Drupal security team</p>
9191

tales/best.html

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ <h4>Brushing your teeth is a best practice.</h4>
1717
<h2> Follow the Drupal Security Team</h2>
1818
<ul>
1919
<li>On Twitter (twitter.com/drupalsecurity)</li>
20-
<li>Via email (on your drupal.org user edit page under newsletters</li>
21-
<li>Via Web (drupal.org/security and drupal.org/security/contrib</li>
20+
<li>Via email (on your drupal.org user edit page under newsletters)</li>
21+
<li>Via Web (drupal.org/security and drupal.org/security/contrib)</li>
2222
</ul>
2323
</section>
2424
<section>
@@ -30,6 +30,7 @@ <h2>Site builders and module authors </h2>
3030
<p> Writing secure code: https://www.drupal.org/writing-secure-code</p>
3131
<p>How to secure your site: https://www.drupal.org/security/secure-configuration</p>
3232
</section>
33+
<!--
3334
<section>
3435
<h2>Security Process</h2>
3536
<ol>
@@ -43,6 +44,7 @@ <h2>Security Process</h2>
4344
</ol>
4445
<h3>Subscribe to the Security Team newsletter via "my newsletter" under edit on www.drupal.org/user.</h3>
4546
</section>
47+
-->
4648
<section cite="https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013">
4749
<h3>Common Web Vulnerabilities</h3>
4850
<h4>From Open Web Application Security Project</h4>
@@ -59,10 +61,7 @@ <h4>From Open Web Application Security Project</h4>
5961
<li>Unvalidated Redirects and Forwards.</li>
6062
</ol>
6163
</section>
62-
<section>
63-
<h2>Using Components with Known Vulnerabilities</h2>
64-
<p>Do you use third-party libraries?</p>
65-
</section>
64+
6665

6766
<section>
6867
<h2> Common Drupal Vulnerabilities from 2014</h2>

tales/tale1.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<section>
22
<h2>The tale of Fitzgerald's shoe store</h2>
33

4-
<p> Our first tale is that of a store where you can order shoes. The site takes orders and redirects you to a 3rd
4+
<p> Our first tale about a store where you can order shoes. The site takes orders and redirects you to a 3rd
55
party for payment. This keeps the site PCI compliant. </p>
66
<img src="tales/images/shoe.jpg" width="30%">
77
</section>
@@ -19,7 +19,7 @@ <h2>Background</h2>
1919
<section>
2020
<h2>On a cold dark Monday</h2>
2121

22-
<p class='fragment'> Myrtle Wilson, book keeper noticed that they were not getting money in their account.</p>
22+
<p class='fragment'> Myrtle Wilson, the bookkeeper noticed that they were not getting money in their account.</p>
2323

2424
<p class='fragment'> Their order volume did not change</p>
2525

tales/tale2.html

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,24 @@ <h2>Background</h2>
1212

1313
<p> The site had all up to date modules installed and an up to date core</p>
1414

15-
<p> The site as going to be a brochure type site with only one admin account. Think a basic corporate site.</p>
15+
<p> The site was being designed to be a brochure type site with only one admin account. Think a basic corporate site.</p>
1616
<p> This was setup on a new development server, dedicated to dev sites for Harpers's LLC</p>
1717
</section>
1818
<section>
1919
<h2>On the 3rd day of development</h2>
2020

21-
<p class="fragment">Jeremy, the content manager, was going to setup content types and notice the site had porn all over the front page</p>
21+
<p class="fragment">Jeremy, the content manager, was going to setup content types and noticed the site had porn all over the front page</p>
2222

2323
<p class="fragment"> Jeremy was not happy</p>
2424
<img class="fragment" src="tales/images/madcat.jpg" cite="http://pixabay.com/"/>
2525
</section>
2626
<section>
2727
<h2>What?</h2>
2828

29-
<p>Jeremy the in house IT person, Jean , who started looking at logs to see how an up to date Drupal site got
29+
<p>Jeremy called the in house IT person, Jean , who started looking at logs to see how an up to date Drupal site got
3030
compromised. </p>
3131

32-
<p>Jean pulled the access logs for the server and found only known trusted IP's accessed the site. </p>
32+
<p>Jean pulled the access logs for the site and found only known trusted IP's accessed the site. </p>
3333

3434
<p> Jean had no idea how it happened so she restored a backup</p>
3535
</section>
@@ -69,15 +69,14 @@ <h2>Apache single user</h2>
6969
<p> By default apache on most OS's will run as a single user </p>
7070

7171
<p> That user has access to READ all the files for all sites on the system</p>
72-
<p> In some cases that user has access to write to all files on the system. (This is bad) </p>
7372

7473
</section>
7574
<section>
7675
<h2>What happened</h2>
7776
<p> Someone had compromised another site on the server.</p>
7877
<p> Using that site, they were able to read settings.php and connect to the new Drupal site's database</p>
7978
<p> They were able to inject spam by updating the table directly</p>
80-
<p>The script used search the entire file system for settings.php and then ran commands to update the database on any site it found. </p>
79+
<p>The attacker search the entire file system for settings.php and then ran commands to update the database on any site they found. </p>
8180
</section>
8281
<section>
8382
<h2>Lessons Learned </h2>

tales/tale3.html

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ <h2>The Non-profit horror story</h2>
99

1010
<section>
1111
<h2>The Non-profit horror story</h2>
12-
<p>Like all Drupal sites, this Drupal site had many modules</p>
12+
<p>Like most Drupal sites, this Drupal site had many modules</p>
1313
</section>
1414

1515

@@ -18,17 +18,17 @@ <h2>The Non-profit horror story</h2>
1818
<h2> The site got compromised, and a PHP shell script was uploaded</h2>
1919
<p class="fragment">All modules were up to date.</p>
2020
<p class="fragment"> There were no known vulnerabilities in any of the modules used, that would have allowed for a PHP shell to be uploaded. </p>
21-
<p class="fragment"> Jack Merridew, the head of their webteam was able to see the php script was used to copy down the users tables. </p>
21+
<p class="fragment"> Jack Merridew, the head of their webteam was able to see the php script was used to copy down the users table. </p>
2222

2323
</section>
2424
<section>
2525
<h2>hacked</h2>
2626
<p class="fragment"> It may have been able to download more parts of the database, but the attacker only left a copy of the users table behind. </p>
27-
<p class="fragment"> The PHP script that was uploaded allowed the attacker to have file system access (download any file including files from Drupal's private file system. </p>
27+
<p class="fragment"> The PHP script that was uploaded allowed the attacker to have file system access (download any file including files from Drupal's private file system). </p>
2828
<p class="fragment"> It also allowed the attacker to run and display the results of SQL queries. </p>
2929
</section>
3030
<section>
31-
<h2>Quick Break Module updates</h2>
31+
<h2>Quick Break: Module updates</h2>
3232
<p>Please text: 734-821-5212</p>
3333

3434
<table class="answertable sticky-enabled">
@@ -48,15 +48,15 @@ <h2> Module updates</h2>
4848

4949
<section>
5050
<h2> A module used a 3rd party library</h2>
51-
<p>The library was updated, however, unless you deleted the old version before installing the new version, you were still vulnerable</p>
51+
<p>The library was updated. Unless you deleted the old version before installing the new version, you are still vulnerable.</p>
5252
</section>
5353
<section>
5454
<img src="tales/images/hacked.png">
5555
</section>
5656

5757
<section>
5858
<h2>Lessons learned</h2>
59-
<p>Remove the library/module/theme before updating, this ensures that all old files are removed</p>
59+
<p>Remove the library/module/theme before updating. This ensures that all old files are removed</p>
6060
<p>Configure PHP so it will not execute code from directories it should not (sites/*/files) </p>
6161
<p>Prevent the webserver from writing to directories that are not (sites/*/files) </p>
6262
<p> The security_review module can help with this.</p>

tales/tale4.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ <h2> SQL Injection is Easy to Exploit</h2>
1515

1616
<p>Other vulnerabilities may require different actors to engage in actions timed correctly.</p>
1717

18-
<p> SQL injection can be exploited most of the time, by just an attacker.</p>
18+
<p> SQL injection can be exploited most of the time, by just an attacker, without an admin's interfactions.</p>
1919
</section>
2020
<section>
2121
<h2> So?</h2>
@@ -66,6 +66,6 @@ <h2>The patch</h2>
6666
<section>
6767
<h2>Some Perspective</h2>
6868
<p> This was a major vulnerability, but let's keep in mind that the last major issue was over 7 years ago. </p>
69-
<p> This code has been in Drupal since Drupal 7 Beta's. </p>
69+
<p> This code has been in Drupal since Drupal 7 Beta. </p>
7070
<p>Nothing is 100% sure, and nothing ever will be. We mitigate risk by using best practices.</p>
7171
</section>

0 commit comments

Comments
 (0)