Загрузка страницы

Using Firewalld Ipsets to Block Hackers on Rocky Linux 8.6

Using FirewallD and IPSets to block hackers or script kids from your system is really important Having an AWS instance running just 22 hours we can show that 222 individual IP addresses have been used top try and exploit the system by potential hackers.

We also show how using AWK we can filter from the journal log very easily to show the IP Addresses that need to be added to a block list.

Additionally you can find my video courses on Pluralsight: http://pluralsight.com/training/Authors/Details/andrew-mallett and take time to see my own site http://www.theurbanpenguin.com

00:00 Introduction to Using Firewalld IPSets to Block Hackers
01:53 Show the efforts of the Hackers after 22 hours
03:05 Filter using AWK
05:21 Check for root login attempts
06:12 Combine output
07:08 Install firewalld
07:34 enable firewalld
09:08 Create ipset
10:40 Add entries to IPset
11:38 Add ipset to source list in DROP zone

-~-~~-~~~-~~-~-
Please watch: "RHCSA 9 Working With Podman Containers"
https://www.youtube.com/watch?v=piwcpd_hWn0
-~-~~-~~~-~~-~-

Видео Using Firewalld Ipsets to Block Hackers on Rocky Linux 8.6 канала theurbanpenguin
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
3 июля 2022 г. 0:12:38
00:14:34
Яндекс.Метрика