Sunday, June 29, 2008

general security

1. EXECUTE THE FOLLOWING COMMANDS TO HELP PREVENT UPLOADS OF EXPLOITS:

chmod 0750 `which curl` 2>&-; chmod 0750 `which fetch` 2>&-;
chmod 0750 `which wget` 2>&-


2. EXECUTE THE FOLLOWING COMMANDS TO CHECK FOR POSSIBLE EXISTING EXPLOITS:

sh
for x in "/dev/shm /tmp /usr/local/apache/proxy /var/spool /var/tmp";
do ls -loAFR $x 2>&- | grep -E "^$|^/| apache | nobody | unknown |
www | web | htdocs " | grep -E "^$|^/|/$|\*$|\.pl$" | grep -Ev
"sess_" | tee exploits.txt; done; echo -e "\n\nPossible Exploit
Files and Directories: `grep -Ev "^$|^/" exploits.txt | wc -l | tr -d
' '`" | tee -a exploits.txt
exit

No comments: