<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Bineesh O C</title>
    <description>The latest articles on DEV Community by Bineesh O C (@bineeshoc).</description>
    <link>https://dev.to/bineeshoc</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2016674%2Fd1e2196f-7dee-4d63-af9c-d8744bf17f83.png</url>
      <title>DEV Community: Bineesh O C</title>
      <link>https://dev.to/bineeshoc</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bineeshoc"/>
    <language>en</language>
    <item>
      <title>Ansible fail2ban</title>
      <dc:creator>Bineesh O C</dc:creator>
      <pubDate>Thu, 19 Dec 2024 05:52:44 +0000</pubDate>
      <link>https://dev.to/bineeshoc/ansible-fail2ban-1mk4</link>
      <guid>https://dev.to/bineeshoc/ansible-fail2ban-1mk4</guid>
      <description></description>
      <category>devops</category>
      <category>ansible</category>
    </item>
    <item>
      <title>Install Chkrootkit</title>
      <dc:creator>Bineesh O C</dc:creator>
      <pubDate>Mon, 09 Sep 2024 04:45:13 +0000</pubDate>
      <link>https://dev.to/bineeshoc/install-chkrootkit-462o</link>
      <guid>https://dev.to/bineeshoc/install-chkrootkit-462o</guid>
      <description>&lt;p&gt;Step 1: SSH into your server&lt;br&gt;
The first thing we need to do is SSH or access your VPS or server with root privileges first&lt;/p&gt;

&lt;p&gt;Step 2: Download software&lt;br&gt;
wget -c &lt;a href="https://src.fedoraproject.org/repo/pkgs/chkrootkit/chkrootkit-0.57.tar.gz/sha512/ff35f01042bc68bdd10c4e26dbde7af7127768442c7a10f114260188dcc7e357e2c48d157c0b83b99e2fd465db3ed3933c84ae12fa411c5c28f64b955e742ff7/chkrootkit-0.57.tar.gz" rel="noopener noreferrer"&gt;https://src.fedoraproject.org/repo/pkgs/chkrootkit/chkrootkit-0.57.tar.gz/sha512/ff35f01042bc68bdd10c4e26dbde7af7127768442c7a10f114260188dcc7e357e2c48d157c0b83b99e2fd465db3ed3933c84ae12fa411c5c28f64b955e742ff7/chkrootkit-0.57.tar.gz&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3: Unzip and install&lt;br&gt;
tar -zxvf chkrootkit-0.57.tar.gz&lt;br&gt;
mkdir /usr/local/chkrootkit&lt;br&gt;
mv chkrootkit-0.57/* /usr/local/chkrootkit&lt;br&gt;
cd /usr/local/chkrootkit&lt;/p&gt;

&lt;p&gt;Now you can run chkrootkit to scan the server with the command below:/&amp;gt;&lt;br&gt;
/usr/local/chkrootkit/chkrootkit&lt;/p&gt;

&lt;p&gt;Step 4: Install automatic rootkit scanning on the system&lt;br&gt;
0 0 * * * /usr/local/chkrootkit/chkrootkit &lt;/p&gt;

&lt;p&gt;for more installation support: &lt;a href="https://winhat.in" rel="noopener noreferrer"&gt;https://winhat.in&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Cyber security check lists</title>
      <dc:creator>Bineesh O C</dc:creator>
      <pubDate>Sat, 07 Sep 2024 16:30:20 +0000</pubDate>
      <link>https://dev.to/bineeshoc/cyber-security-check-lists-1f3d</link>
      <guid>https://dev.to/bineeshoc/cyber-security-check-lists-1f3d</guid>
      <description>&lt;ol&gt;
&lt;li&gt;Change ssh port number from 22 to custom number&lt;/li&gt;
&lt;li&gt;Disable root direct login or ssh access.&lt;/li&gt;
&lt;li&gt;Setup ssh key login for all ssh users.&lt;/li&gt;
&lt;li&gt;Block all port except http. https, ssh&lt;/li&gt;
&lt;li&gt;Disable Unwanted Linux Services # chkconfig --list | grep '3:on'&lt;/li&gt;
&lt;li&gt;Disable directory listing [Options Indexes]&lt;/li&gt;
&lt;li&gt;Keep updating server Regularly # yum update -y&lt;/li&gt;
&lt;li&gt;Install csf, fail2ban and mod_security&lt;/li&gt;
&lt;li&gt;Hide Apache Version Number and Other Sensitive Info&lt;/li&gt;
&lt;li&gt;Forward 80 port access to 443 i.e http to https&lt;/li&gt;
&lt;li&gt;404 error redirect # ErrorDocument 404 &lt;a href="https://domain.com/404.html" rel="noopener noreferrer"&gt;https://domain.com/404.html&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Check any of users have empty passwords # cat /etc/shadow | awk -F: '($2==""){print $1}'&lt;/li&gt;
&lt;li&gt;Disable IPv6.&lt;/li&gt;
&lt;li&gt;Block anonymous FTP upload&lt;/li&gt;
&lt;li&gt;Disable unwanted php functions //disable_functions in php.ini&lt;/li&gt;
&lt;li&gt;Disable weak ciphers&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For more help and support &lt;a href="https://winhat.in" rel="noopener noreferrer"&gt;https://winhat.in&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
