ກວດຫາມັດແວໃນເຄື່ອງເຊີບເວີດ້ວຍ LMD (CENTOS 6.4)

ກວດຫາມັດແວໃນເຄື່ອງເຊີບເວີດ້ວຍ LMD (CENTOS 6.4)

LMD (Linux Malware Detect) ເປັນ Software ທີ່ຖືກພັດທະນາເພື່ອຫາມັດແວໃນເຄື່ອງ Linux ໂດຍສະເພາະເຊິ່ງມີຟີເຈີທີ່ຂ້ອນຂ້າງຄວບຄຸມທັງການກວດສອບຫາມັດແວຈາກ signatures ທີ່ມີການເຂົ້າລະຫັດ MD5 , HEX , Base64 , PHP Shell ແລະ ອື່ນໆ ( ຈະມີການອັບເດດຖານຂໍ້ມູນມັດແວໃໝ່ໆຈາກເຊີບເວີຂອງຜູ້ພັດທະນາຢູ່ສະເໝີ) ແລະ ຈາກທີ່ເຮົາທົດລອງໃຊ້ມາກໍຖືວ່າຂ້ອນຂ້າງຖືກຕ້ອງ ແລະ ເໝາະສົມກັບເວັບເຊີບເວີຫຼາຍ ຈຶ່ງຢາກແນະນໍາໃຫ້ໄດ້ທົດລອງໃຊ້ ທີ່ສໍາຄັນເປັນ Open Source

Features:

– MD5 file hash detection for quick threat identification
– HEX based pattern matching for identifying threat variants
– statistical analysis component for detection of obfuscated threats (e.g: base64)
– integrated detection of ClamAV to use as scanner engine for improved performance
– integrated signature update feature with -u|–update
– integrated version update feature with -d|–update-ver
– scan-recent option to scan only files that have been added/changed in X days
– scan-all option for full path based scanning
– checkout option to upload suspected malware to rfxn.com for review / hashing
– full reporting system to view current and previous scan results
– quarantine queue that stores threats in a safe fashion with no permissions
– quarantine batching option to quarantine the results of a current or past scans
– quarantine restore option to restore files to original path, owner and perms
– quarantine suspend account option to Cpanel suspend or shell revoke users
– cleaner rules to attempt removal of malware injected strings
– cleaner batching option to attempt cleaning of previous scan reports
– cleaner rules to remove base64 and gzinflate(base64 injected malware
– daily cron based scanning of all changes in last 24h in user homedirs
– daily cron script compatible with stock RH style systems, Cpanel & Ensim
– kernel based inotify real time file scanning of created/modified/moved files
– kernel inotify monitor that can take path data from STDIN or FILE
– kernel inotify monitor convenience feature to monitor system users
– kernel inotify monitor can be restricted to a configurable user html root
– kernel inotify monitor with dynamic sysctl limits for optimal performance
– kernel inotify alerting through daily and/or optional weekly reports
– e-mail alert reporting after every scan execution (manual & daily)
– path, extension and signature based ignore options
– background scanner option for unattended scan operations
– verbose logging & output of all actions

ຂັ້ນຕອນການຕິດຕັ້ງ (CentOS 6.4)

1 > ດາວໂຫຼດ Linux Malware Detect (LMD)

# cd /root
# wget http://www.rfxn.com/downloads/maldetect-current.tar.gz

2 > ຕິດຕັ້ງ LMD

# tar xfz maldetect-current.tar.gz
# cd maldetect-1.4.2
# chmod 775 install.sh
# sh install.sh

3 > ຂັ້ນຕອນການ Config

vi /usr/local/maldetect/conf.maldet

email_alert : ຫາກໃຫ້ມີການແຈ້ງເຕືອນໄປທີ່ email ໃຫ້ກໍານົດເປັນ 1
email_subj : ຫົວຂໍ້ Email ທີ່ໃຊ້ສໍາລັບແຈ້ງເຕືອນ
email_addr : ຕັ້ງຄ່າ Email ທີ່ໃຊ້ສໍາລັບແຈ້ງເຕືອນ
quar_hits : ຫາກກວດພົບມັດແວ ກໍານົດ 0 ຄືໃຫ້ການແຈ້ງເຕືອນເສີຍໆ ກໍານົດ 1 ເພື່ອບໍ່ໃຫ້ກັກກັນບໍ່ໃຫ້ມີການ execute ໄຟລດັ່ງກ່າວ
quar_clean : ຫາກຕ້ອງການກໍາຈັດມັດແວເລີຍໃຫ້ກໍານົດຄ່າ 1
quar_susp : suspend Account ທີ່ກວດພົບມັດແວ ແນະນໍາຄ່າ 0 ເພາະອາດຈະກະທົບກັບ service ບາງຢ່າງໄດ້
quar_susp_minuid : ໄລຍະເວລາ suspend Account

# [ EMAIL ALERTS ]
##
# The default email alert toggle
# [0 = disabled, 1 = enabled]
email_alert=1
# The subject line for email alerts
email_subj=”maldet alert from $(hostname)”
# The destination addresses for email alerts
# [ values are comma (,) spaced ]
email_addr=”[email protected]”
# Ignore e-mail alerts for reports in which all hits have been cleaned.
# This is ideal on very busy servers where cleaned hits can drown out
# other more actionable reports.
email_ignore_clean=0
##
# [ QUARANTINE OPTIONS ]
##
# The default quarantine action for malware hits
# [0 = alert only, 1 = move to quarantine & alert]
quar_hits=1
# Try to clean string based malware injections
# [NOTE: quar_hits=1 required]
# [0 = disabled, 1 = clean]
quar_clean=1
# The default suspend action for users wih hits
# Cpanel suspend or set shell /bin/false on non-Cpanel
# [NOTE: quar_hits=1 required]
# [0 = disabled, 1 = suspend account]
quar_susp=0
# minimum userid that can be suspended
quar_susp_minuid=500

4 > ວິທີການນໍາໃຊ້ maldet

# maldet –scan-all /home

# maldet –quarantine SCANID
OR
# maldet –clean SCANID

ສາມາດຕັ້ງຄ່າໃຫ້ maldet ເຮັດວຽກທຸກໆເວລາທີ່ເຮົາຕ້ອງການໄດ້ໂດຍແກ້ໄຂຄ່າ config ທີ່ໄຟລ /etc/cron.daily/maldet

ຂໍ້ມູນເພີ່ມເຕີມ
http://www.rfxn.com/projects/linux-malware-detect
http://www.tecmint.com/install-linux-malware-detect-lmd-in-rhel-centos-and-fedora/

ບົດຄວາມທີ່ກ່ຽວຂ້ອງ


ລະບົບ MONITOR SERVICE ພ້ອມຈັດການລະບົບແບບອັດຕະໂນມັດດ້ວຍ MONIT

Monit ເປັນໂປຣແກຣມ open source ທີ່ມີຄຸນສົມບັດດ້ານການ Monitor Service ໃນລະບົບ ບາງຄັ້ງ…

ติดตั้ง DELL OPENMANAGER
Dell OpenManager ຄືຊຸດຊັອບແວທີ່ Dell ເຮັດອອກມາເພື່ອບລິການຈັດການ ແລະ ກວດກາຄວາມຜິດປົກກະຕິຂອງ…

ເພີ່ມຄວາມປອດໄພໃຫ້ກັບ Linux Server ດ້ວຍ Lynis
Lynis ເປັນເຄື່ອງມືສໍາລັບສ້າງ Security Audit ແລະ hardening…

ກວດກາປະລິມານການຮັບສົ່ງຂໍ້ມູນດ້ວຍ iperf
iperf ເປັນເຄື່ອງມືສໍາລັບກວດກາການຮັບສົ່ງຂໍ້ມູນລະຫວ່າງເຄື່ອງເຊີບເວີ 2…

ເຮັດໃຫ້ການວິເຄາະ Access Log ງ່າຍຂຶ້ນດ້ວຍ goaccess
Goaccess ເປັນ Tools ສໍາລັບຊ່ວຍວິເຄາະ Log ຂອງເຊີບເວີທີ່ຮອງຮັບທັງ Apache และ Nginx…