Following my last post about how to ensure a bit more our wordpress instance, today I implemented some basic rules for nginx that can be useful to block some automate brute force attacks to our wordpress administration panel generated by
Protecting SSH with Two-Factor authentication
Google authenticator is a client to provide multi-factor authentication based on time-based one-time password algorithm TOTP. How you can see it’s very easy to increase a bit more the security in our Linux servers. A verification token has to be
Blocking Port Scan Attacks with psad
Port Scan Attack Detector (psad) allow us detect and block possible port scan or suspicious traffic in real time. psad is designed for work with iptables, configuring syslog to send log messages from the facility kern.info to /var/lib/psad/psadfifo, to analyze
Configuring a SSL/TLS VPN with OpenVPN
openvpn is a vpn solution that implements connections for the layer 2 or 3, using the SSL/TLS protocol stack. Configuring a vpn SSL/TLS is a good idea and enhance the security of our communications due to the data cipher using
Configuring FreeRadius for AAA Cisco clients
AAA is a network protocol that define basically three functionality, Authentication, Authorization and Accounting. It’s very useful for distributed systems to need authenticate users to have access for a specific services. In this post We’ll configure FreeRadius as AAA server and configure a
Mitigating a SYN Flood Attack
Before speak about syn flood and some possible mitigation for these attacks, we’ve to remember how works a TCP communication between the server and client. Basically a connection between two hosts (A and B) is composed by three steps: 1) Establishes a communication
Implementation of FreeBSD Jails (Part II): Tuning Jails
Continuing with the last post deploying a Jail, now We’ll see how to personalize the restrictions of our jails over sysctl configuration, specifically using the directive security.jail.* for the FreeBSD Kernel. I’ll show some useful directives to configure and his
Implementation of FreeBSD Jails (Part I): Deploying a Jail
Jails are tools available for FreeBSD to enhance the security for our systems. The concept for a jail is very similar with the chroot but jails are an improvement of it. Chroot limits a process to see only a part of
Snort from scratch (Part III): Writing Snort rules
Continuing with the posts about Snort Snort from scratch (part II), now we have a complete installation and web interface to monitor our network alerts. One of the most important things when you maintain an IDS like Snort in a
Snort from scratch (Part II): Installing BASE & barnyard2
Continuing with the last post Snort from scratch part I now I’ll explain how to install BASE and barnyard2. BASE (Basic Analysis and Security Engine) provides a web front-end to query and analyze the alerts coming from Snort. The alerts will