Advisable To Have Security Scan By Someone?

Jun 14, 2008

Is it advisable to have someone scan your server setup, ie the firewall? If so, what is used to scan the firewall?

View 13 Replies


ADVERTISEMENT

Security Updates/Scan For VPS

Oct 1, 2008

to install secuity patches for each VPS hosted on single host or appling it to host running multiple VPS is enough.

Does same applies to firewall related software..Use it for individual VPS on single host?

View 1 Replies View Related

What To Use To Scan For Trojan?

Jun 2, 2009

We have a client claming that she gets a Trojan warming when she trys to access her website but using the Trojan scan in cpanel doesn't show anything.

What can we use to scan for Trojan?

View 5 Replies View Related

How-to - Rootkit Scan (trojan Etc)

Jan 21, 2004

What is a rootkit? The following link is a very good read to answer that question.

http://linux.oreillynet.com/pub/a/li...4/rootkit.html

In Summary, a rootkit is a trojan installed on your Linux server after someone has broken into it. These files are used to cover the hackers tracks, and to give the hacker tools to do more dirty work from your server.

Usage:

1. su - (change to root user)
2. mkdir /usr/local/chkrootkit
3. wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz
4. tar -xvzf chkrootkit.tar.gz
5. cd chkrootkit*
6. cp * /usr/local/chkrootkit
7. cd /usr/local/chkrootkit
8. make sense

Now scan your system:

1. cd /usr/local/chkrootkit
2. ./chkrootkit

chkrootkit may from time to time give false positives. If you ever get a positive or "infected hit" scan a second time. If you do get a positive hit, google the hit to research the issue and steps to correct.

Part 2 - automated chkrootkit, and emailed results.

I'm lazy, and like my server to do the work for me so I have it scan every day, and email me the results.

Usage:

1. vi /etc/cron.daily/chkrootkit
2. add the following code.

Code:
#!/bin/bash
(cd /usr/local/chkrootkit; ./chkrootkit -q 2>&1 | mail -s "Daily chkrootkt scan" you@yourdomain.com)
3. chmod 0755 /etc/cron.daily/chkrootkit

This will email you@yourdomain.com every morning with your chkrootkit results. the -q option will only show you exploits.

Removal:

If you don't like getting the emails or just want to remove this from your server:

1. rm /etc/cron.daily/chkrootkit
2. rm -rf /usr/local/chkrootkit

All files will now be deleted from your server.

View 14 Replies View Related

Scan Virus On Sever?

Mar 2, 2007

Is this possible we can scan virus on the account on server?

View 1 Replies View Related

In Rootkit Hunter Scan

Jun 26, 2009

how to correct it?

Code:
---------------------- Start Rootkit Hunter Scan ----------------------
Warning: Checking for prerequisites [ Warning ]
The file of stored file properties (rkhunter.dat) does not exist, and so must be created. To do this type in 'rkhunter --propupd'.
Warning: WARNING! It is the users responsibility to ensure that when the '--propupd' option
is used, all the files on their system are known to be genuine, and installed from a
reliable source. The rkhunter '--check' option will compare the current file properties
against previously stored values, and report if any values differ. However, rkhunter
cannot determine what has caused the change, that is for the user to do.

One or more warnings have been found while checking the system.

Please check the log file (/var/log/rkhunter/rkhunter.log)

View 2 Replies View Related

To Scan A Linux Box For Xss Scripts

May 4, 2008

What's the best way to do a daily check for xss scripts injected into php and html files on a linux box?

I am referring to stuff like framer.z
[url]
which essentially has a telltail signature of

<script>eval(unescape("%77%69...
Is there anything for linux that keeps up with those kinds of script signatures?

I doubt CSF or Clam looks for that kind of stuff, right?

View 3 Replies View Related

How I Can Do Shell Scan In My Server

May 20, 2008

i have server and i want to do shell scan and delete the shell

View 4 Replies View Related

Windows Server Scan

May 2, 2007

I am not much familiar with windows server scan. How can I do full scan on the server? I want to make sure that server is secure.

View 3 Replies View Related

Free Server Securiy Scan

Dec 14, 2008

Any body knows of free server security scan for my dedicated?

View 4 Replies View Related

Port Scan Attacked On Users

Apr 14, 2007

[url]

[url]

One of my users posted this in the forum saying my server is scanning his computer. His this serious? Do I have virus? Should i be worried? Well i am kinda worried. I tried googling it, but i can't seem to figure the right keywords for a good result.

View 4 Replies View Related

Plesk 12.x / Linux :: Wordpress Scan Not Seeing Install Of 4.1.1?

Apr 1, 2015

So I have a client using Wordpress 3.6, so the scan does little good.

I update the Wordpress to 4.1.1 and do the Scan again. Plesk cannot find the updated install of WP still?

View 5 Replies View Related

Joomla Security / Linux Security

Apr 4, 2008

I run a web hosting company and one of my servers is a LAMP server running CentOs 5. A user of mine has a Joomla installation running to manage his website and he has run into the following problem that I am puzzled by.

When Joomla adds a component or module to itself, or when a user uses the Joomla upload functionality, Joomla will add the new files under the user name "apache". This makes sense as it is the apache service running PHP that is actually creating the files.

However, when he FTP's into the account to modify these files, he doesn't have the appropriate permissions to do so as he doesn't have a root level login, just permissions on his home directory which is the site. Any help would be much appreciated.

Also, does anyone know how to change the owner/group of a directory and all of its sub directories in Linux without changing the actual permissions? I.e. some of the files in the folder have different permissions (0644 as apposed to 0755) than its parent but if I do a top down user/group change on the folder it will change everything in that folder to 0755.

View 10 Replies View Related

Web Security

Jul 16, 2009

I have regarding hosting/designing my application. Users of my website upload highly sensitive files to the server. I'll use SSL but will that be enough since the files are not encrypted on the server. I tried to encrypt the files but that is adding a huge overhead.

My first question is - is it a good idea to store the files on the server rather than a database? My other question is regarding hosting; I'm thinking of building my own server and host it in a colo. Is colo more secure than dedicated hosting? Currently i'm still in the process of developing my App and my environment is Windows Server 2008/SQL Server 2005.

View 13 Replies View Related

Mod Security

Feb 9, 2007

Is there any problems with having duplicate rules in different files as I have downloaded some rules and am going to make them all into one file to give me the best protection, but this is going to take time and I really need some sort of protection now

View 2 Replies View Related

Security

Aug 25, 2007

after install ConfigServer Firewall i get the following ...

ConfigServer Security & Firewall - csf v2.89 >>
PHP Check >>
Check php for register_globals >>
WARNING >> You should modify the PHP configuration (usually in /usr/local/lib/php.ini) and set:
register_globals = Off

unless it is absolutely necessary as it is seen as a significant security risk

must i modify it?or not? put in ur consideration i tried to download it to modify an error occured!

View 2 Replies View Related

How Much Security

Aug 24, 2007

I am on a shared server account with Lunar Pages basic hosting plan.

The only script file I have up running is db Masters FormM@iler. It runs on Cpanel. I deleted whatever other scripts I could find on my server. The site is just basic html pages with jpgs and a gif.

Is there much else I really need to do to secure the server or is that more in Lunar Pages' hands?

If there is still more I can do to secure the server, and is it a small amount that's easy to do or would it be wise to just hire someone else to put in a few hours making sure everything is truly set up securely?

View 5 Replies View Related

Security

Apr 23, 2007

I have a vps that has been exploited, and the hosting company is giving me advise on what to do to fix the security problems, but i need a good server administrator/company to help me with this. can anyone recommend a company that will go thru my server,

View 8 Replies View Related

On Becoming A Security

Mar 27, 2007

I'm inheriting a website that is currently a mess. It was designed in Joomla, but everything about the site by the original designer, is completely a mess. Files weren't placed in their proper directory hiearchy, the site has been hacked into a few times...basically a big headache.

I'm willing to learn and my first goal is the redesign the site. Currently, I'm looking at choosing a CMS or just rebuilding it in Joomla. The problem is that the site is a big part of the business, so any down time is not good.

I have some questions I hope you experienced folks can help me with...

Does CMS choice have any bearing on whether or not its a security vulnerability? If so, which one's are "less a target" of getting hit?

I just want to design the site from scratch and make it secure as possible from suggestions on various forums. I don't want to be a security admin, but is that what I'll end up having to do to run a site like this?

What are my options between "doing it myself" vs "hiring a third party"?

The company is right now in a tween stage. Fast growth but not enough to hire a security guy, based on my talks with the CEO. I disagree with this, but what can I do in the meantime to plug the site holes?

I'm almost wanting to go commercial so I don't have all the headaches, but the company wants to save money. What can be done in those situations?

Before I go out and spend money on books, what do you recommend I buy to start getting my feet wet in what may become a future in IT security?

This is from someone who's just inherited a dedicated server with a swiss cheese website. What is the first order of business for someone who is in the dark and will not get much support in regards to spending more money?

how do I secure my site "on my own"?

View 5 Replies View Related

Php Security

Feb 26, 2007

I noticed that my vps had utilized 250 gig of traffic in one day [i average 5 gig per MONTH] with cpu usage of close 100%; my hosting company pinpointed one php file which had allowed an outside varibale to be placed in "include" function so that the outside php code was being run;

Is there any program/scripts that can immediately email me if cpu usage stays high
the nic card is being utilized too much memory usage exceed certain levles this way, i would know i have been hijacked in time and try to find the culprit i use knownhost with cpanel/linux mysql and php.

View 5 Replies View Related

Security

Jul 21, 2007

i have an unix server [don't know what version i think it's FreeBSD ]

[url]

and i use WS_FTP to upload the files to my server.. but i have a big problem all my files are encrypted with some problems but when people use getrigh browser or some kind off program to acess my server instead of a normal browser it appears the list of files i have upload and they can download them and when i set password for images etc it's all safe, but people can't acess parts of the site without password... i want to know if there's some way of protect my file without interfering with the normal browser acess.

View 9 Replies View Related

Security

Jul 24, 2007

when we run server with shared hosting. we mostly facing issue os security like c9shell scripts.. as well as ppl hacked database or changed index.html. we do enable php open base dir as well as mo security firewall we do search which user is using find command who is uploading file... but is there any other way to secure server for such hacking issue..

View 5 Replies View Related

Security

Mar 26, 2007

I have run rkhunter and got message saying that /bin/dmesg [BAD]

# rpm -qf /bin/dmesg
util-linux-2.12a-16.EL4.20
# rpm -V util-linux-2.12a-16.EL4.20
.M...... /usr/bin/chsh

It looks like RPM damaged? How can I confirm it?

View 2 Replies View Related

Security

Jul 10, 2007

When securing a vps system, do things like Enable Shell Fork Bomb/Memory Protection use much memory or any other secuirty measure?

View 3 Replies View Related

Security

Oct 31, 2007

We have a e-commerce web site that has the latest shopping cart software ( that is known to be secure) ssl cert, etc.

We got a call today from a guy who says that he used his brand new card on our web site and that the card was stolen and used on anothoer site within hours. We have checked every file on the web site, logging into serevr root and checking everything and cant find any evidence of a hack or security breach of any kind.

can someone recommend a reliable company that can go in and check things out for us to see if they can find anny security issues, or evidence of a breach? There must be a company out there that does this sort of thing

View 4 Replies View Related

Web Hosting Security

Apr 8, 2008

I am conducting some research into potential risks that web hosts have to deal with on a daily basis. What potential security risks are there for web hosts ? And how do they overcome these issues?

View 6 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved