Tag

Server Security

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Dec 26, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server breach, describing the symptoms, investigative commands, log analysis, malicious script removal, file attribute unlocking, and practical remediation steps, while highlighting key lessons and preventive measures for future security.

Intrusion DetectionLinuxRootkit Removal
0 likes · 16 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Nov 25, 2024 · Information Security

Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised

This article walks through a real-world intrusion on an Alibaba Cloud CentOS server, detailing how a disguised gpg-agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning, and provides concrete hardening recommendations to prevent similar attacks.

Server Securitylinux incident responsemalware
0 likes · 13 min read
Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised
Architect's Guide
Architect's Guide
Jun 5, 2024 · Information Security

How to Block Foreign IP Addresses in Nginx Using the ngx_http_geoip2 Module

This guide explains step‑by‑step how to install the GeoIP2 library, compile Nginx with the ngx_http_geoip2 module, download the MaxMind GeoLite2 database, configure Nginx to map country codes, and block non‑Chinese visitors by returning a 404 response.

GeoIP2IP blockingLinux
0 likes · 8 min read
How to Block Foreign IP Addresses in Nginx Using the ngx_http_geoip2 Module
DevOps Operations Practice
DevOps Operations Practice
May 3, 2024 · Information Security

Top Antivirus Solutions for Linux Systems

This article reviews several leading cross‑platform antivirus products—Avast, ESET NOD32, F‑PROT, ClamAV, Comodo, and Sophos—highlighting their features, Linux compatibility, and considerations for securing servers while noting that proper security practices may reduce the need for constant antivirus deployment.

LinuxMalware ProtectionServer Security
0 likes · 5 min read
Top Antivirus Solutions for Linux Systems
Efficient Ops
Efficient Ops
Aug 15, 2023 · Information Security

How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response

This article details a real‑world Linux server intrusion, describing the observed symptoms, the forensic investigation using commands like ps, top, last, and grep, the removal of malicious cron jobs and backdoors, and the lessons learned for securing SSH, file attributes, and cloud security groups.

LinuxRootkitSSH
0 likes · 15 min read
How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response
Java Captain
Java Captain
Mar 7, 2023 · Information Security

Server Intrusion Investigation and Remediation Steps

This article details a recent server intrusion case, describing the observed symptoms, possible causes, step‑by‑step forensic investigation using commands like ps, top, grep and crontab, and comprehensive remediation actions such as tightening SSH security, unlocking and restoring system binaries, removing malicious scripts, and key lessons for future protection.

Server Securitychattrincident response
0 likes · 14 min read
Server Intrusion Investigation and Remediation Steps
Architecture Digest
Architecture Digest
Oct 8, 2022 · Information Security

Server Intrusion Investigation and Remediation Steps on a Linux Host

This article documents a real‑world Linux server compromise, detailing the observed symptoms, forensic commands, malicious scripts, file‑locking tricks, and a step‑by‑step remediation process including SSH hardening, cron cleanup, chattr usage, and preventive security recommendations.

Intrusion DetectionLinuxRootkit
0 likes · 15 min read
Server Intrusion Investigation and Remediation Steps on a Linux Host
Java Captain
Java Captain
Sep 14, 2022 · Information Security

Server Intrusion Investigation and Remediation on a Compromised Linux Host

This article documents a recent Linux server compromise, detailing observed symptoms, investigative commands, discovered malicious scripts, and step‑by‑step remediation actions such as restricting SSH access, unlocking and restoring system utilities, removing malicious cron jobs, and hardening the system against future attacks.

LinuxMalware RemovalSSH
0 likes · 13 min read
Server Intrusion Investigation and Remediation on a Compromised Linux Host
Efficient Ops
Efficient Ops
Sep 13, 2022 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server compromise, describing the symptoms, possible causes, investigative commands, hidden malicious scripts, file attribute locks, and practical remediation steps to restore the system and improve future security.

Intrusion DetectionLinuxRootkit
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
php中文网 Courses
php中文网 Courses
Aug 6, 2022 · Information Security

Building a Custom IP Filtering System for Public Servers with Automated Whitelisting

Facing constant port scans and malicious login attempts on a public server, the author outlines a self‑developed IP filtering solution that automatically adds trusted IPs to a whitelist, featuring multi‑process support, concurrency, daemon mode, a web management panel, traffic statistics, and interception logging.

IP filteringServer Securityfirewall
0 likes · 3 min read
Building a Custom IP Filtering System for Public Servers with Automated Whitelisting
Efficient Ops
Efficient Ops
May 4, 2022 · Information Security

How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do

This article recounts a real‑world incident where a SpringBoot server was compromised by a crypto‑mining malware, details the malicious code and its actions, shows forensic traces left on the system, and provides step‑by‑step remediation and hardening recommendations.

HardeningServer SecuritySpringBoot RCE
0 likes · 12 min read
How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do
Architecture Digest
Architecture Digest
Dec 14, 2021 · Information Security

Implementing a Dynamic IP Blacklist with Nginx, Lua, and Redis

This guide explains how to build a dynamic IP blacklist using Nginx, Lua scripts, and Redis to block malicious or unwanted requests at the server level, covering architecture choices, installation steps, configuration details, and the benefits of a lightweight, shared, and easily updatable solution.

IP blacklistLuaNginx
0 likes · 4 min read
Implementing a Dynamic IP Blacklist with Nginx, Lua, and Redis
Laravel Tech Community
Laravel Tech Community
Jul 2, 2021 · Operations

Blocking Foreign IP Access in Nginx with the ngx_http_geoip2 Module

This guide explains how to install the ngx_http_geoip2 module, upgrade Nginx, configure GeoIP2 databases, and modify the Nginx configuration to block requests from foreign IP addresses, providing step‑by‑step commands and example code for a Linux server.

GeoIP2IP blockingLinux
0 likes · 8 min read
Blocking Foreign IP Access in Nginx with the ngx_http_geoip2 Module
macrozheng
macrozheng
Nov 26, 2020 · Information Security

Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix

After my small 1‑CPU, 2 GB server was compromised by a crypto‑mining virus that hijacked SSH access, I used VNC to investigate, identified malicious processes, traced infected files, removed cron jobs, restored system utilities, repaired SELinux, and closed the Redis vulnerability to fully recover the machine.

LinuxRedis vulnerabilitySSH
0 likes · 10 min read
Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix