nuy

fedora41_en

Fedora41 ; SNORT3 Install

SNORT3Snort is an open source network intrusion detection system that can perform real-time traffic analysis and packet logging on IP networks.It can perform "protocol analysis," "content search," and "matching" and can be used to detect a variety of attacks such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, semantic URL attacks, and server message block probes. detection.
fedora41_en

Fedora41 ; Tripwire,Logwatch,Disk Usage Check Script

Tripwire1.Install# dnf -y install tripwire2.Passphrase settingLogwatch①Install# dnf install logwatch②Edit configuration fileIntroduce disk usage check script1. Script Creation# cd /var/www/system# vi disk_capacity_check.sh
fedora41_en

Fedora41 ; System Backup and Restore

1.Website data backupBackup under /var/www/html①Create backup script file2.MySQL database backup①Create backup script file3.Web configuration file (under html) restored① Copy the HTML backup file to the "/ (root)" directory of the server to be used for restoration4.Restore MySQL data①Save database backup file to any directory
fedora40_en

Fedora40 ; Suricata , SNORT3 Install

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.1. Suricata Installation and Configuration①Suricata installSNORT3Snort is an open source network intrusion detection system that can perform real-time traffic analysis and packet logging on IP networks.It can perform "protocol analysis," "content search," and "matching" and can be used to detect a variety of attacks such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, semantic URL attacks, and server message block probes. detection.
fedora40_en

Fedora40 ; Clamav , Mail Server

1. Clamav ( anti-virus software )1.1 Clam AntiVirus Install# dnf -y install clamav clamd clamav-update1.2 Edit Clam AntiVirus configuration file2. Mail server(Postfix)2.1 Postfix InstallInstall Postfix and build an SMTP server# dnf -y install postfixCheck if Postfix is installed3. Mail server(Dovecot)3.1 Dovecot Install# dnf -y install dovecot4.Create mail user and check operation4.1 advance preparation①Pretreatment for new usersWhen a new user is added, set up the system to automatically send and receive e-mail.Mail Server : Postfix + Clamav + clamav-milter+SpamAssassin1.Real-time scanning of e-mails①clamav-milter InstallVirus checks are performed on the mail server side using Clam AntiVirus.The mail server and Clam AntiVirus are linked using clamav-milter.
OracleLinux8.10_en

OracleLinux8.10 ; OS Install & Initial settings

OracleLinux8.10 InstallOracle Linux provides a 100% application binary compatible alternative to Red Hat Enterprise Linux and CentOS Linux for both hybrid and multi-cloud environments.Since 2006, Oracle Linux has been completely free to download and use. Source code, binaries and updates are provided free of charge. It is freely redistributable. Free for use in production environments.We will proceed with the latest updated Oracle Linux 8.10 (released August 29, 2024) with Vo.8.Oracle Linux 8.10 installation image (OracleLinux-R8-U10-x86_64-dvd.iso ) can be downloaded from the following sitehttps://www.oracle.com/linux/The installation process is the same as for OracleLinux8.8, so please refer to the following page.
OracleLinux8.10_en

OracleLinux8.10 ; SSH Remote connection , Firewalld , NTP Server

1.Setting up a remote connection via SSHSSH is a service for connecting remotely to a server and is basically running immediately after the OS is installed, but the default settings are somewhat insecure.Here we will configure the default settings to increase the security of SSH connections.2.Firewall (Firewalld) settingsIn Oracle, the firewall is firewalld configured by default and enabled during OS installation.To briefly explain "firewalld," when setting communication control policies, communication permission/blocking rules are applied to predefined zones, and these zones are then assigned to each NIC (network adapter).
OracleLinux8.10_en

OracleLinux8.10 ; SSH connection with SSH key pair

Creation of public and private key pairsCreate a public/private key pair for a user connecting to the Linux server using OpenSSH.Use ssh-keygen to create key pairs.Creation of public/private key pairs is performed with remote login user privileges。If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
OracleLinux8.10_en

OracleLinux8.10 ; FTP Server , Samba FileServer

1.FTP Server1.1vsftpd Install# dnf -y install vsftpd1.2vsftpd configurationSave the unedited vsftpd.conf with .bak# cp /etc/vsftpd/vsftpd.conf /home/huong/vsftpd.conf.bak2. vsftpd SSL/TLSConfigure Vsftpd to use SSL/TLS2.1 Create self-signed certificatesThis work is not required if you are using a trusted, legitimate certificate such as Let's Encryp3. File server installation with SambaBuild a file server with access rights that requires user authentication with Samba.Installation Procedure①Create shared folders with access rights that require user authentication②Accessible group creation③Creation of users belonging to accessible groups④Configuration File Edit
OracleLinux8.10_en

OracleLinux8.10 ; WEB Server (Apache)

1.Apache2 Install , Virtual Host Configuration1.1 Apache2 install2. Use of CGI Scripts①CGI availability check3. PHP installation and configuration4. Digest authentication with Apache2Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts and transmits authentication information, so there is almost no risk of information leakage.
OracleLinux8.10_en

OracleLinux8.10 ; Clamav(anti-virus) , Mail Server

clamav(anti-virus)1.Clam AntiVirus Install# dnf -y install clamav clamd clamav-update2.Edit Clam AntiVirus configuration fileMail Server Installation1. Postfix1.1 InstallInstall Postfix and build an SMTP server# dnf -y install postfixMail Server : Postfix + Clamav + clamav-milter+SpamAssassin1.Real-time scanning of e-mails①clamav-milter InstallVirus checks are performed on the mail server side using Clam AntiVirus.The mail server and Clam AntiVirus are linked using clamav-milter.
OracleLinux8.10_en

OracleLinux8.10 ; SSL Certificate Acquisition( Let's Encrypt ) , WEB/Mail server SSL

1. SSL Certificate Acquisition ( Let's Encrypt )Install the latest open ssl# dnf install openssl-devel1.1 advance preparation1.Package management system Snappy installationSince the SSL certificate issuing tool "certbot" of Let's Encrypt is recommended to be installed using "snap" after 2021, install Snapd first.(Can also be installed the traditional way with dnf or yum)2. Converting Apache to httpsInstall the following# dnf -y install mod_ssl2.1 Edit ssl.conf file3. SSL/TLS (Let's Encrypt) settings on the mail server3.1 Obtaining a certificate for the mail serverObtain a certificate for the mail server, but it cannot be obtained in the same way as above, so the following with the "--standalone" option fails.
OracleLinux8.10_en

OracleLinux8.10 ; MySQL8 , WordPress

MySQL8 Install# dnf -y install mysql-servercharset.cnf   Create a new one with the fWordPress Install1. Create database for Word PressAs an example, assume database [wp_db] database user [wp_user] password [?W123456]
OracleLinux8.10_en

OracleLinux8.10 ; Suricata Install

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.
OracleLinux8.10_en

OracleLinux8.10 ; SNORT3 Install

SNORT3Snort is an open source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks。It can perform “protocol analysis,” “content search,” and “matching,” and can be used to detect various attacks such as “buffer overflows,” “stealth port scans,” “CGI attacks,” “SMB probes,” “OS fingerprinting attempts,” “semantic URL attacks,” and “server message block probes. The system can be used to detect a variety of attacks, such as1.advance preparation①Add a CodeReady repository and install the required software