Understanding the Linux chattr Command: A Comprehensive Guide

chattr

Introduction This guide introduces you to the chattr command in Linux. While many Linux users know about file permissions, few discuss the additional control attributes offer. You can manipulate these attributes using the chattr command. What is chattr? The chattr command allows you to change file attributes on a Linux file system. These attributes can … Read more

Use of Zip and Unzip command in Linux

zip-and-unzip

What is Zip ? Zip is a file format that helps to compress one or more files together into a single location. As an archiving tool, zip is used for backup files as well as for transferring the files between servers. The zip file format supports the lossless compression algorithm. In this article, we are discussing … Read more

Buy Signature subscribers

Malware Signatures

ClamAV is an open-source anti-virus engine designed to detect viruses, Trojans, malware and other threats. It supports multiple file formats (documents, executables or archives), uses multi-threaded scanner features and receives updates 3-4 times a day for its signature database. Additionally, we are updating our database, so the user will get improved results. Benefits of using … Read more

Malware Scanner Tools for Linux

malware scanner tools

We all know that Linux is the most powerful operating system around us, but there is a misconception that Linux does not need any antivirus programs on it. For maximum protection this is essential. More than 60% of web-servers are running on Linux servers and most of them are protected with some solutions. From my … Read more

Decode signatures with Sigtool

Tutorial

When you are scanning malware example ClamAV or Maldet from files in server and get positive hit, you may difficult find where has injected code in the file. For decoding signature you can use ClamAV sigtool command line tool. This will help you find the right position from infected file and remove malware code. Positive … Read more

Cryptonight

Malware details

This again new malware which we call cryptonight, what we haven’t seen before. It’s downloads executable Linux program and hides that http daemon in background, which is difficult find process list at first glance. Manual remove process You can search if there running process httpd, which start cryptonight parameter: ps aux | grep cryptonight Then … Read more

How to Securing Web Server

Tutorial

Here in this tutorial we are talking about the basics of the steps required when securing Web server. Hacking is regularly performed by automated scripts written to scour the Internet in an attempt to exploit known website security issues in software. Here are 8 basic tips to help keep your server safe secure and online. … Read more

load_all.jar

Malware details

Today we found Java based malware. If attacker found File Upload vulnerability on the server, then it upload manual.php based malware, which trying load load_all.jar to server and running it background. Manual.php $out = shell_exec(“java -version 2>&1”); preg_match(“/version\s+\”1\.(\d+)\./”,$out,$matches); $ver = 0; if($matches)$ver = (int)$matches[1]; This manual.php uses lot off shell_exec function, but if you have … Read more

How To Set Up a Firewall Using Iptables

Setting up a good firewall is an essential step to take in securing any modern operating system. Most Linux distributions ship with a few different firewall tools that we can use to configure our firewalls. In this guide, we’ll be covering the iptables firewall. A good starting point is check the current rules that are … Read more

Linux Server Hardening Security Tips

Securing your Linux server is important to protect your and customers data, intellectual property, and time, from the hands of crackers/hackers. The system administrator is responsible for security Linux Server. 1. Use only Encrypt Data Communication Because all data transmitted over a network is open to monitoring. Encrypt transmitted data whenever possible with password or … Read more