nuy

MiracleLinux9.2_en

MiracleLinux9.2 ; SNORT3 , Tripwire Install

Snort3 Install Snort is an open source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks. It can perform "protocol analysis," "content search," and "matching," and can be used to detect a variety of attacks, including "buffer overflows," "stealth port scans," "CGI attacks," "SMB probes," "OS fingerprinting attempts," "semantic URL attacks," and "server message block probes. MiracleLinux8 does not have a Snort3 repository, so build, compile and install Snort3 from source code 1. Advance preparation ①Install required build tools and libraries
MiracleLinux9.2_en

MiracleLinux9.2 ; System Backup and Restore

1.Website data backup 1-1.Backup under /var/www/html ①Create backup script file # cd /var/www/system # vi backup_html.sh 2.MySQL database backup ①Create backup script file # cd /var/www/system # vi db_my_backup.sh 3.Restore backup files under html ①Store HTML backup files in "/ (root)" directory 4.Restore Mysql backup file ①Save the database backup file to any directory and (In the example, the directory is "/var/www/backup/db_bak".)Extracting data
miracle9.0_en

MiracleLinux9.0 :  System Backup and Restore

1.Website data backup 1-1.Backup under /var/www/html ①Create backup script file # cd /var/www/system # vi backup_html.sh 2.MySQL database backup ①Create backup script file # cd /var/www/system # vi db_my_backup.sh 3.Restore backup files under html ①Store HTML backup files in "/ (root)" directory 4.Restore Mysql backup file ①Save the database backup file to any directory and (In the example, the directory is "/var/www/backup/db_bak".)Extracting data
MiracleLinux8.8_en

MiracleLinux8.8 ; Snort3 , Tripwire Install

Snort3 Install Snort is an open source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks. It can perform "protocol analysis," "content search," and "matching," and can be used to detect a variety of attacks, including "buffer overflows," "stealth port scans," "CGI attacks," "SMB probes," "OS fingerprinting attempts," "semantic URL attacks," and "server message block probes. MiracleLinux8 does not have a Snort3 repository, so build, compile and install Snort3 from source code 1. Advance preparation ①Install required build tools and libraries
miracle9.0_en

MiracleLinux9.0 : Mysql8 , WordPress Install

Mysql8 Install # dnf -y install mysql-server charset.cnf   Create a new one with the following contents WordPress Install 1. Create database for Word Press As an example, assume database [wp_db] database user [wp_user] password [?W123456]
miracle9.0_en

MiracleLinux9.0 : SSL Certificate Acquisition( Let's Encrypt ) , Apache SSL , Mail SSL/TLS

1.Obtain an SSL certificate ( Let's Encrypt ) Install the latest open ssl # dnf install openssl-devel 1.1 advance preparation 1.Package management system Snappy installed Since the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum) 2. Converting Apache to https Install the following just in case # dnf -y install mod_ssl 3. SSL/TLS (Let's Encrypt) settings on the mail server 3.1 Obtaining a certificate for the mail server Obtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
miracle9.0_en

MiracleLinux9.0 : WEB Server(Apache2) Install & Virtual Hosts

1.Apache2 Install , Virtual Host Configuration 1.1 Apache2 install ①httpd install # dnf -y install httpd 1.3 Virtual Host Settings Assign and configure the domain name [alma.korodes.com] to the document root [/var/www/html/alam.korodes.com] directory for virtual host operation 2. Use of CGI Scripts ①CGI availability check 3. PHP installation and configuration 1.PHP8 Install 4. Digest authentication with Apache2 Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted. On the other hand, Digest Authentication encrypts and transmits authentication informa
miracle9.0_en

MiracleLinux9.0 : FTP Server , Samba File Server

1.FTP Server 1. 1 Vsftpd Install # dnf -y install vsftpd 1.2 Configure Vsftpd Save the unedited vsftpd.conf with .bak 3. File server installation with Samba Build a file server with access rights that requires user authentication with Samba. Installation Procedure ①Create shared folders with access rights that require user authentication ②Accessible group creation ③Creation of users belonging to accessible groups ④Configuration File Editing
miracle9.0_en

MiracleLinux9.0 : SSH Authenticated connection with key pair

SSH connection with authentication using public key cryptography Creation of public and private key pairs Create a public/private key pair for a user connecting to the Linux server using OpenSSH. Use ssh-keygen to create key pairs. Creation of public/private key pairs is performed with remote login user privileges. If you do not specify the destination and file name, id_ed25519 and id_eed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
miracle9.0_en

MiracleLinux9.0 :  Tripwire Chkrootkit Logwatch DiCE etc.

Tripwire 1.Download and installation # cd /usr/local/src 1. Logwatch ①Install # dnf install logwatch ②Edit configuration file 2. DiCE Whenever the global IP changes, which happens when the network is disconnected or the router is disconnected and rebooted, the dynamic DNS must be accessed to inform the user that the global IP has changed. DiCE does this automatically! 3.Introduce disk usage check script 3.1 Script Creation # cd /var/www/system # vi disk_capacity_check.sh
miracle9.0_en

MiracleLinux9.0 :  Suricata , SNORT Install

 Suricata SURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic. The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.。 SNORT Snort is an open source network intrusion detection system that can perform real-time traffic analysis and packet logging on IP networks. It can perform "protocol analysis," "content search," and "matching" and can be used to detect a variety of attacks such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, semantic URL attacks, and server message block probes. detection.
miracle9.0_en

MiracleLinux9.0 : Clamav( anti-virus ) , Mail Server

Clamav (anti-virus software)Install 1.Clamav install # dnf -y install clamav clamd clamav-update 2.Clam AntiVirus  Configuration File Edit Mail Server Install 1. Postfix 1.1 Install Install Postfix and build an SMTP server 2.Dovecot 2.1 dovecot install # dnf -y install dovecot 2.2 Edit dovecot.conf file
miracle9.0_en

MiracleLinux9.0 : SSH , Firewalld , NTP Server

1.Setting up SSH remote connection SSH is a service to connect to a server remotely, and is basically running right after the OS installation, but the default settings are somewhat insecure. In this section, we will configure the settings to change the default settings and increase the security of the ssh connection. 1.1 Change the configuration file of SSH service. The configuration file for the SSH service is "/etc/ssh/sshd_config". Open the configuration file with vi editor
MiracleLinux8.8_en

MiracleLinux8.8 ; chkrootkit , Logwatch Install

chkrootkit Install ①chkrootkit Download and installation # cd /usr/local/src # wget https://launchpad.net/chkrootkit/main/0.55/+download/chkrootkit-0.55.tar.gz # tar xvf chkrootkit-0.55.tar.gz ➁Create /root/bin directory and move chkrootkit command to that dir Logwatch ①Install # dnf install logwatch ②Edit configuration file # cat /usr/share/logwatch/default.conf/logwatch.conf >> /etc/logwatch/conf/logwatch.conf # vi /etc/logwatch/conf/logwatch.conf Per Line 45 Set "MailTo = root" as a comment and set the email address you want to receive notifications to the line below it. #MailTo = root MailTo = [Mail address] Per Line 79 Set the level of detail for log notifications #Detail = Low Detail = High ③Output Logwatch reports # logwatch --output stdout
Almalinux9.2_en

AlmaLinux9.2 ; SSL Certificate Acquisition( Let's Encrypt ) , Apache SSL , Mail SSL/TLS

1. .Obtain an SSL certificate ( Let's Encrypt ) Install the latest open ssl 1.1 advance preparation 1.Package management system Snappy installed Since the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum) 2. Converting Apache to https Install the following just in case 3. SSL/TLS (Let's Encrypt) settings on the mail server 3.1 Obtaining a certificate for the mail server Obtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.