被攻击Linux 80端口遭受恶意攻击.(linux80端口)

Recently, I was informed by my production administrator that…

Recently, I was informed by my production administrator that one of my Linux systems was subjected to a malicious attack on port 80. By carefully analyzing my system logs, I was able to infer that someone was attempting to gain access to this Linux system and that the attack had been ongoing for some time.

When I first discovered the attack, I took immediate action to protect and secure my system. I verified that the firewall was up-to-date and was properly configured to lock down port 80 on the affected Linux system. Next, I used the following iptables command to drop all traffic coming from sources other than my trusted networks:

iptables -A INPUT -p tcp --dport 80 -s ! xx.xx.xx.xx -j DROP

At this point, I also disabled external access to port 80 on the Linux system by using the following UFW command:

ufw deny 80/tcp

However, I was still concerned that someone may have been able to gain access to the system before I had taken these precautions. To determine if any objects or files had been tampered with, I ran a series of integrity scans using the AIDE tool. The scans uncovered some suspicious behavior, indicating that the attacker may have been attempting to exploit a known vulnerability in the system.

To prevent the attacker from further infiltrating my system, I patched the system with the latest security updates and also performed a malware scan, using an updated and trusted anti-malware program. Additionally, I changed all user credentials to ensure that the attacker would no longer have access to the system.

Finally, to ensure that there are no further attacks, I implemented a comprehensive intrusion detection system (IDS) on the affected Linux system. This will monitor all incoming and outgoing traffic and alert me whenever suspicious activity is detected. Additionally, I have set up regular system scans and vulnerability checks to help me detect any potential security threats in the future.

At this time, my Linux system appears to be safe and secure from any further malicious attacks on port 80. Through my knowledge of the system, swift action, and proper tools, I was able to mitigate and prevent serious damage to the system.

香港服务器首选港服(Server.HK),2H2G首月10元开通。
港服(Server.HK)(www.IDC.Net)提供简单好用,价格厚道的香港/美国云服务器和独立服务器。IDC+ISP+ICP资质。ARIN和APNIC会员。成熟技术团队15年行业经验。

为您推荐

ssh远程超时中断的解决办法

有时我们网络正常的,但SSH连接经常出现中断的情况,以及在SSH远程时很慢的问题。 这是由于OpenSSL服务默认启用了...

Linux系统防火墙放行端口

如果您服务器内安装了宝塔面板,请直接登陆宝塔面板,安全,里面添加放行端口。如果添加后不生效,把防火墙开关一下即可。本教程...

Linux主机简单判断被CC攻击的网站命令-比较直接有效

CC攻击很容易发起,并且几乎不需要成本,导致现在的CC攻击越来越多。 大部分搞CC攻击的人,都是用在网上下载的工具,这些...

linux环境下测试get和post请求

Linux环境下测试get和post请求 ?get,post,curl   get请求 curl: curl ...

umount卸载磁盘提示target is busy

umount卸载磁盘提示target is busy. (目标忙) 的问题解决方案   umount卸载磁盘提...
返回顶部