Security

Regresshion: an openssh server remote code execution vulnerability (cve-2024-6387)

regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387)

On 1 July 2024 we released a fix for the high-impact CVE-2024-6387 vulnerability, nicknamed regreSSHion, as part of the coordinated release date (CRD). Discovered and responsibly disclosed by Qualys, the unauthenticated, network-exploitable remote code execution flaw affects the OpenSSH server daemon (sshd) starting with version 8.5p1 and before 9.8p1. As for the versions distributed and supported by Ubuntu, […]

regreSSHion: an OpenSSH server remote code execution vulnerability (CVE-2024-6387) Read More »

How to set up ssh keys on ubuntu 22. 04

How to Set Up SSH Keys on Ubuntu 22.04

Secure Shell Technology or SSH is a network communication protocol that permits two systems to securely communicate in an unsecured network. This cryptographic protocol is also utilized for command–line executables or remote login programs such as terminal applications. Users who want to use SSH for connecting to other remote systems must have SSH configured on

How to Set Up SSH Keys on Ubuntu 22.04 Read More »

How to install snort on ubuntu 20. 04

How to install Snort on Ubuntu 20.04

This article provides a guide for how to install Snort on Ubuntu 20.04 (Focal Fossa). Snort is a lightweight, open source network intrusion prevention system for running a network intrusion detection system (NIDS). Snort is used to monitor the packet data sent / received over a specific network interface. Network intrusion detection systems can intercept

How to install Snort on Ubuntu 20.04 Read More »

Ant media server firewall configuration

Ant Media Server Firewall Configuration

Set Ant Media Server Firewall Rules Use the following rules for Ant Media Server Firewall Configuration: 1 2 3 4 5 6 7 8 ufw allow ssh ufw allow http ufw allow https ufw allow 1935/tcp ufw allow 5080/tcp ufw allow 5443/tcp ufw allow 5000:65000/udp enable ufw After enabling, you will have following status 1

Ant Media Server Firewall Configuration Read More »

Rubygems dependency confusion attack side of things

RubyGems dependency confusion attack side of things

Note: This article is not to deprecate any of the findings and achievements of Alex Birsan. He did great work exploiting specific vulnerabilities and patterns. It is to present the RubyGems side of the story and to reassure you. We actively work to provide a healthy and safe ecosystem for our users. After reading the

RubyGems dependency confusion attack side of things Read More »

Rubygems bitcoin stealing malware postmortem

RubyGems Bitcoin Stealing Malware postmortem

Introduction On the 7th and 13th of December, there were two malicious packages uploaded to RubyGems. Here’s the postmortem and analysis of the packages’ content. Diffend.io platform that I run closely cooperates with the RubyGems team, providing immediate insights into any gems that have “weird” characteristics. Thanks to that, the gems were yanked relatively fast.

RubyGems Bitcoin Stealing Malware postmortem Read More »

Diffend – oss supply chain security and management platform for ruby

Diffend – OSS supply chain security and management platform for Ruby

I’m incredibly excited to announce a security platform for managing Ruby gems dependencies: diffend.io. This platform is a result of my involvement in Ruby security matters for years. It all started in early 2018 with a tool to review gems versions diffs. While working on it, I’ve noticed that there’s much more that needs to

Diffend – OSS supply chain security and management platform for Ruby Read More »

How to take over a ruby gem and what to do with it / rubykaigi 2019 presentation

How to take over a Ruby gem and what to do with it / RubyKaigi 2019 presentation

Using Ruby gems is safe, right? We’re a nice community of friendly beings that act towards the same goal: making Ruby better. But is that true? Can we just blindly use libraries, without making sure, that they are what they are supposed to be? Learn how you can take over a gem, what you can

How to take over a Ruby gem and what to do with it / RubyKaigi 2019 presentation Read More »

Install and configure csf configserver firewall

Install and Configure CSF ConfigServer Firewall

Install and Configure CSF ConfigServer Firewall About CSF Firewall ConfigServer Security and Firewall, also known as CSF, is an opensource software firewall application. It is working based on iptables. Firewall configuration script created to provide better security for your server while giving you an easy to use, advanced interface for managing your firewall settings. CSF configures

Install and Configure CSF ConfigServer Firewall Read More »

Protecting apache server from denial-of-service attacks

Protecting Apache Server From Denial-of-Service Attacks

Protecting Apache Server From Denial-of-Service Attacks Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often

Protecting Apache Server From Denial-of-Service Attacks Read More »