Off lately their was buzz all around Internet regarding SSH Ebury trojan, lots of misconceptions!! We have around 400 linux servers with over 8000 websites hosted on… Read more “Ebury Trojan — Hoax or Original?”
Author: mjmokaal
IPtables String matching
IPtables is not an ordinary firewall unless and until not used properly. Their are cases where security analysts do not have an option to play with hardware… Read more “IPtables String matching”
HTTP Authentication for APC
Their are times where you need apc.php to clear browser cache, either you can write a code to clear the cache or to view cache contents via… Read more “HTTP Authentication for APC”
Clam-Scan Revisited
We already had discussions on how we can make clam-scan rock solid, it’s implementation. Ref: http://ustechnica.com/2013/06/19/clam-scan-from-an-eye-of-an-ethical-hacker/ Recently, A customer came to us with an issue of intermittent downtime… Read more “Clam-Scan Revisited”
WordPress Persuasion Theme – Arbitrary File Download and File Deletion Exploit
I don’t know why developers around the globe are so much into copy and pasting it before actually checking out things manually? This is just a standard… Read more “WordPress Persuasion Theme – Arbitrary File Download and File Deletion Exploit”
Incremental Backup using Innobackup
This is not new, their are many scripts available in Google but they lack many things while taking Incremental backups using Innobackup. at-least I couldn’t find one. :). If you guys… Read more “Incremental Backup using Innobackup”
Auto table sync in Master-Slave replication environment
It’s been a while since last post, I’ve been busy and so had been away from blogging. from past 2 months, I was working extensively with Percona… Read more “Auto table sync in Master-Slave replication environment”
Clam-Scan from an eye of an Ethical Hacker
ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. What are we doing here? Let’s implement the below… Read more “Clam-Scan from an eye of an Ethical Hacker”
Advanced Intrusion Detection Environment
What is AIDE? AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker. It is a host-based intrusion detection system (HIDS) for checking the integrity… Read more “Advanced Intrusion Detection Environment”
WordPress Brute Force attack
There is a brute-force login attack targeted at websites with WordPress. Due to the nature of the attack, memory consumption on targeted servers has increased. In some cases this… Read more “WordPress Brute Force attack”