SlideShare a Scribd company logo
Practical Web Server Security
By : Khawar Nehal
http://atrc.net.pk
5 August 2019
Muftasoft (TM)
Reason
There are many documents and articles on web
server security.
But I noticed I could share some ideas which are
old tried and tested for us but new for others
because we do not see them mentioned around
commonly.
The common ones floating around
I shall start by repeating those which are common
and maybe modify them a little.
Remove unnecessary services.
The number one reason for this provided by the
security people is that if the service is on then it
can be exploited.
This is true. However if it is not on, then it cannot
be exploited.
From my experience you need to be experienced
enough to make sure a service is off and stays off.
Remove unnecessary services.
The number two reason for this provided by the
security people (cracking side) is that if the
service is or software is installed, it can be used
by an attacker.
Remove unnecessary services.
This always seemed like a useless idea to me
because if I was a serious cracker, then I would
have all my software in one “bag” or file and
always available on the Internet ready for
download anywhere.
If I had root access, then I could download my
better and more capable software to do what I
wanted. So this does not really count.
Remove unnecessary services.
If you can demonstrate something better, then I
shall update this idea. Otherwise the experience
rules over the common suggestions provided.
Also there are reasons to have software around.
An example is ping. If you need to remove this
service, then you need to explain why you are too
lazy to fix the service software itself.
Remote access
Do not ever login from someone else’s computer
into the servers.
Hey business manager, if the admin does so, fire
them immediately. They are not security
conscious enough to work in the 20th
and 21st
century.
Remote access
If the admin is too lazy to have their own
computer to acces, they are not even professional
enough or qualified for the job.
Use ssh or some VPN based login.
Remote access
If the admin uses any insecure OS like Windows
to login, then they need to be fired.
I believe that this one change shall avoid more
than 50% of attacks.
Remote access
To confirm see how many attackers get access
via gaining passwords of admins from insecure
software based computers like windows before
they attack any system.
Remote access
https://www.securityweek.com/compromised-creden
tials-primary-point-attack-data-breaches
The next two slides are an excerpt from the above
article.
Remote access
The easiest way for a cyber-attacker to gain
access to sensitive data is by compromising an
end user’s identity and credentials. Things get
even worse if a stolen identity belongs to a
privileged user, who has even broader access,
and therefore provides the intruder with “the keys
to the kingdom”.
Remote access
By leveraging a “trusted” identity a hacker can
operate undetected and exfiltrate sensitive data
sets without raising any red flags. As a result, it’s
not surprising that most of today’s cyber-attacks
are front-ended by credential harvesting
campaigns. Common methods for harvesting
credentials include the use of password sniffers,
phishing campaigns, or malware attacks.
Remote access
Common methods for harvesting credentials
include the use of password sniffers, phishing
campaigns, or malware attacks.
These do not work on secure computers which
the admins could use. Examples include well
configured and updated opensource bugfree and
TRANSPARENT softwares like BSD and Linux.
Remote access
For very secure computers, have the server send
an SMS to verify the admin IP to allow the login
when the admin is roaming.
Remote access
Public wireless networks are the same as the rest
of the Internet. Who thinks that ssh or VPN based
connections would behave differently when going
through a public wireless network ?
Backup
Have offline and off site backups of all servers
data. Online backups are optional but not
sufficient.
Have backups of important desktops and laptops
and mobiles on backup servers.
Separate computers
Have separate computers for the development
and production environments.
This shall add another layer of checking to make
sure the production is hardened more than a
development machine.
Separate computers
Have separate computers for back end software
and static files.
Software like CMS should create static output.
Almost all software should create static output
and place it on the server generated output
server.
Separate computers
Have three web servers at least.
Server #1 for static file serving and modified via
technical users not common users directly.
Separate computers
Server #2 for running CMS editing softwares and
other backend web based software. Output is
static files to be automatically placed on server #3
Server #3 for storing and presenting files created
by server #2 as static files. No interaction
software active.
Separate computers
All software shall reside on server #2 and Servers
#1 and #3 shall only have static HTML and FTP
servers for serving files.
Separate computers
Server #1 shall host the static HTML main pages.
Chances of them being defaced with this method
are now near zero. A serious zero day is required
to do so.
Servers #1 and #3 do not have CGI or PHP type
stuff enabled.
Updates
Regular updates need to be done after regular
backups of the servers.
Some updates can destroy the system and make
it nonfunctional.
Updates
Test updates on development machines before
implementing on production machines.
Updates
For normal servers, updates every month. Admins
need to test only the critical security updates on
development machines and implement them on
the production servers. The other updates are not
required as long as the system is working.
Updates
Unnecessary updates can cause malfunctions
and are a waste of time.
Logs
Check the logs daily to make sure no one is trying
to get it.
Or at least did not get in. There can be many login
entries of tries.
Get a log analyzer to help if required.
Permissions
Check all permissions to make sure no user has
more than they need.
Apache modules
Eliminate or turn off all unused modules of the
webserver.
Updates
Subscribe to security alerts. In case a new
security flaw is found.
If a new flaw is found, then backup and update
the servers in a day on the development server to
test. Then update on the production after it works
on on the development server.
Automated scanners
Use automated scanners to check for
vulnerabilities.
If you have followed the steps mentioned so far,
you should get none found from all softwares and
systems available.
Automated scanners
If any are found, they shall be non critical and do
not allow user or root level access anywhere you
have not allowed specifically.
Thanks
Thanks for reading.
If you have suggestions for improvement, then
please email to khawar@atrc.net.pk
Thanks
Hopefully I can incorporate the ideas into the
updates of this one and into other future
presentations.
Practical Web Server Security
By : Khawar Nehal
http://atrc.net.pk
5 August 2019
Muftasoft (TM)

More Related Content

What's hot

Presentation
PresentationPresentation
Presentation
HASSAN RAZA
 
Antivirus for windows server 2008
Antivirus for windows server 2008Antivirus for windows server 2008
Antivirus for windows server 2008
hillarycinton
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
John Dorner
 
ESAPI
ESAPIESAPI
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
Raghu Addanki
 
Virus part1
Virus part1Virus part1
Virus part1
Ajay Banyal
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pchaimkarel
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
Zack Fabro
 
How to remove System Protector From Your System
How to remove System Protector From Your SystemHow to remove System Protector From Your System
How to remove System Protector From Your System
costamary
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
venkasureantivirus
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
V.R.RAO Mentreddi
 
Quick Heal
Quick HealQuick Heal
Quick Healdheva B
 
Norton Antivirus Support
Norton Antivirus SupportNorton Antivirus Support
Norton Antivirus Support
John Mark
 
Spring Security
Spring SecuritySpring Security
Spring Security
Knoldus Inc.
 
5th Slide Show
5th Slide Show5th Slide Show
5th Slide Showsmithj12
 
So Your Company Hired A Pentester
So Your Company Hired A PentesterSo Your Company Hired A Pentester
So Your Company Hired A PentesterNorthBayWeb
 
so big
so bigso big
so bigcainem
 

What's hot (18)

Presentation
PresentationPresentation
Presentation
 
Antivirus for windows server 2008
Antivirus for windows server 2008Antivirus for windows server 2008
Antivirus for windows server 2008
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
ESAPI
ESAPIESAPI
ESAPI
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Virus part1
Virus part1Virus part1
Virus part1
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
How to remove System Protector From Your System
How to remove System Protector From Your SystemHow to remove System Protector From Your System
How to remove System Protector From Your System
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
QuickHeal Anti-Virus
QuickHeal Anti-VirusQuickHeal Anti-Virus
QuickHeal Anti-Virus
 
Quick Heal
Quick HealQuick Heal
Quick Heal
 
Norton Antivirus Support
Norton Antivirus SupportNorton Antivirus Support
Norton Antivirus Support
 
Spring Security
Spring SecuritySpring Security
Spring Security
 
5th Slide Show
5th Slide Show5th Slide Show
5th Slide Show
 
So Your Company Hired A Pentester
So Your Company Hired A PentesterSo Your Company Hired A Pentester
So Your Company Hired A Pentester
 
so big
so bigso big
so big
 

Similar to Web server security techniques by Khawar Nehal

Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
aquacareser
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
Divyanisetia
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
Temok IT Services
 
2016 Guide to User Data Security
2016 Guide to User Data Security2016 Guide to User Data Security
2016 Guide to User Data Security
Sean Bryant
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
Mohmad Feroz
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administrationConcentrated Technology
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
karthikvcyber
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
Nikhil Mittal
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practiceswebhostingguy
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
Jennifer Lopez
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
SecurityTube.Net
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
Amazon Web Services
 
Database Security Explained
Database Security ExplainedDatabase Security Explained
Database Security Explainedwensheng wei
 

Similar to Web server security techniques by Khawar Nehal (20)

Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
unit5final
unit5finalunit5final
unit5final
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
2016 Guide to User Data Security
2016 Guide to User Data Security2016 Guide to User Data Security
2016 Guide to User Data Security
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Database Security Explained
Database Security ExplainedDatabase Security Explained
Database Security Explained
 

More from Khawar Nehal khawar.nehal@atrc.net.pk

Linux Class 1 Reasons to use linux
Linux Class 1 Reasons to use linux Linux Class 1 Reasons to use linux
Linux Class 1 Reasons to use linux
Khawar Nehal khawar.nehal@atrc.net.pk
 
Same old lessons in investing
Same old lessons in investingSame old lessons in investing
Same old lessons in investing
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux class 15 26 oct 2021
Linux class 15   26 oct 2021Linux class 15   26 oct 2021
Linux class 15 26 oct 2021
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux class 10 15 oct 2021-6
Linux class 10   15 oct 2021-6Linux class 10   15 oct 2021-6
Linux class 10 15 oct 2021-6
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux class 9 15 oct 2021-5
Linux class 9   15 oct 2021-5Linux class 9   15 oct 2021-5
Linux class 9 15 oct 2021-5
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux class 8 tar
Linux class 8   tar  Linux class 8   tar
File systems linux class 8
File systems linux class 8File systems linux class 8
File systems linux class 8
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux commands Class 5 - 8 oct 2021
Linux commands Class 5 - 8 oct 2021Linux commands Class 5 - 8 oct 2021
Linux commands Class 5 - 8 oct 2021
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux course fhs file hierarchy standard
Linux   course   fhs file hierarchy standardLinux   course   fhs file hierarchy standard
Linux course fhs file hierarchy standard
Khawar Nehal khawar.nehal@atrc.net.pk
 
Linux passwords class 4
Linux passwords class 4Linux passwords class 4
Linux passwords class 4
Khawar Nehal khawar.nehal@atrc.net.pk
 
Using linux 5 oct 2021 3
Using linux 5 oct 2021 3Using linux 5 oct 2021 3
Using linux 5 oct 2021 3
Khawar Nehal khawar.nehal@atrc.net.pk
 
Everyday uses of linux
Everyday uses of linux  Everyday uses of linux
Everyday uses of linux
Khawar Nehal khawar.nehal@atrc.net.pk
 
Computing people
Computing people  Computing people
Artificial Intelligence by Khawar Nehal
Artificial Intelligence by Khawar NehalArtificial Intelligence by Khawar Nehal
Artificial Intelligence by Khawar Nehal
Khawar Nehal khawar.nehal@atrc.net.pk
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
Khawar Nehal khawar.nehal@atrc.net.pk
 
Electric Vehicles
Electric VehiclesElectric Vehicles
Electric Vehicles
Electric VehiclesElectric Vehicles
RevOps Revenue Operations
RevOps Revenue OperationsRevOps Revenue Operations
RevOps Revenue Operations
Khawar Nehal khawar.nehal@atrc.net.pk
 
Management techniques of the world by khawar nehal 4 august 2020-1
Management techniques of the world by khawar nehal   4 august 2020-1Management techniques of the world by khawar nehal   4 august 2020-1
Management techniques of the world by khawar nehal 4 august 2020-1
Khawar Nehal khawar.nehal@atrc.net.pk
 
Kona (TM) Autonomous Cars Anti Collision System
Kona (TM) Autonomous Cars Anti Collision SystemKona (TM) Autonomous Cars Anti Collision System
Kona (TM) Autonomous Cars Anti Collision System
Khawar Nehal khawar.nehal@atrc.net.pk
 

More from Khawar Nehal khawar.nehal@atrc.net.pk (20)

Linux Class 1 Reasons to use linux
Linux Class 1 Reasons to use linux Linux Class 1 Reasons to use linux
Linux Class 1 Reasons to use linux
 
Same old lessons in investing
Same old lessons in investingSame old lessons in investing
Same old lessons in investing
 
Linux class 15 26 oct 2021
Linux class 15   26 oct 2021Linux class 15   26 oct 2021
Linux class 15 26 oct 2021
 
Linux class 10 15 oct 2021-6
Linux class 10   15 oct 2021-6Linux class 10   15 oct 2021-6
Linux class 10 15 oct 2021-6
 
Linux class 9 15 oct 2021-5
Linux class 9   15 oct 2021-5Linux class 9   15 oct 2021-5
Linux class 9 15 oct 2021-5
 
Linux class 8 tar
Linux class 8   tar  Linux class 8   tar
Linux class 8 tar
 
File systems linux class 8
File systems linux class 8File systems linux class 8
File systems linux class 8
 
Linux commands Class 5 - 8 oct 2021
Linux commands Class 5 - 8 oct 2021Linux commands Class 5 - 8 oct 2021
Linux commands Class 5 - 8 oct 2021
 
Linux course fhs file hierarchy standard
Linux   course   fhs file hierarchy standardLinux   course   fhs file hierarchy standard
Linux course fhs file hierarchy standard
 
Linux passwords class 4
Linux passwords class 4Linux passwords class 4
Linux passwords class 4
 
Using linux 5 oct 2021 3
Using linux 5 oct 2021 3Using linux 5 oct 2021 3
Using linux 5 oct 2021 3
 
Everyday uses of linux
Everyday uses of linux  Everyday uses of linux
Everyday uses of linux
 
Computing people
Computing people  Computing people
Computing people
 
Artificial Intelligence by Khawar Nehal
Artificial Intelligence by Khawar NehalArtificial Intelligence by Khawar Nehal
Artificial Intelligence by Khawar Nehal
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Electric Vehicles
Electric VehiclesElectric Vehicles
Electric Vehicles
 
Electric Vehicles
Electric VehiclesElectric Vehicles
Electric Vehicles
 
RevOps Revenue Operations
RevOps Revenue OperationsRevOps Revenue Operations
RevOps Revenue Operations
 
Management techniques of the world by khawar nehal 4 august 2020-1
Management techniques of the world by khawar nehal   4 august 2020-1Management techniques of the world by khawar nehal   4 august 2020-1
Management techniques of the world by khawar nehal 4 august 2020-1
 
Kona (TM) Autonomous Cars Anti Collision System
Kona (TM) Autonomous Cars Anti Collision SystemKona (TM) Autonomous Cars Anti Collision System
Kona (TM) Autonomous Cars Anti Collision System
 

Recently uploaded

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
daothibichhang1
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 

Recently uploaded (20)

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 

Web server security techniques by Khawar Nehal

  • 1. Practical Web Server Security By : Khawar Nehal http://atrc.net.pk 5 August 2019 Muftasoft (TM)
  • 2. Reason There are many documents and articles on web server security. But I noticed I could share some ideas which are old tried and tested for us but new for others because we do not see them mentioned around commonly.
  • 3. The common ones floating around I shall start by repeating those which are common and maybe modify them a little.
  • 4. Remove unnecessary services. The number one reason for this provided by the security people is that if the service is on then it can be exploited. This is true. However if it is not on, then it cannot be exploited. From my experience you need to be experienced enough to make sure a service is off and stays off.
  • 5. Remove unnecessary services. The number two reason for this provided by the security people (cracking side) is that if the service is or software is installed, it can be used by an attacker.
  • 6. Remove unnecessary services. This always seemed like a useless idea to me because if I was a serious cracker, then I would have all my software in one “bag” or file and always available on the Internet ready for download anywhere. If I had root access, then I could download my better and more capable software to do what I wanted. So this does not really count.
  • 7. Remove unnecessary services. If you can demonstrate something better, then I shall update this idea. Otherwise the experience rules over the common suggestions provided. Also there are reasons to have software around. An example is ping. If you need to remove this service, then you need to explain why you are too lazy to fix the service software itself.
  • 8. Remote access Do not ever login from someone else’s computer into the servers. Hey business manager, if the admin does so, fire them immediately. They are not security conscious enough to work in the 20th and 21st century.
  • 9. Remote access If the admin is too lazy to have their own computer to acces, they are not even professional enough or qualified for the job. Use ssh or some VPN based login.
  • 10. Remote access If the admin uses any insecure OS like Windows to login, then they need to be fired. I believe that this one change shall avoid more than 50% of attacks.
  • 11. Remote access To confirm see how many attackers get access via gaining passwords of admins from insecure software based computers like windows before they attack any system.
  • 13. Remote access The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even worse if a stolen identity belongs to a privileged user, who has even broader access, and therefore provides the intruder with “the keys to the kingdom”.
  • 14. Remote access By leveraging a “trusted” identity a hacker can operate undetected and exfiltrate sensitive data sets without raising any red flags. As a result, it’s not surprising that most of today’s cyber-attacks are front-ended by credential harvesting campaigns. Common methods for harvesting credentials include the use of password sniffers, phishing campaigns, or malware attacks.
  • 15. Remote access Common methods for harvesting credentials include the use of password sniffers, phishing campaigns, or malware attacks. These do not work on secure computers which the admins could use. Examples include well configured and updated opensource bugfree and TRANSPARENT softwares like BSD and Linux.
  • 16. Remote access For very secure computers, have the server send an SMS to verify the admin IP to allow the login when the admin is roaming.
  • 17. Remote access Public wireless networks are the same as the rest of the Internet. Who thinks that ssh or VPN based connections would behave differently when going through a public wireless network ?
  • 18. Backup Have offline and off site backups of all servers data. Online backups are optional but not sufficient. Have backups of important desktops and laptops and mobiles on backup servers.
  • 19. Separate computers Have separate computers for the development and production environments. This shall add another layer of checking to make sure the production is hardened more than a development machine.
  • 20. Separate computers Have separate computers for back end software and static files. Software like CMS should create static output. Almost all software should create static output and place it on the server generated output server.
  • 21. Separate computers Have three web servers at least. Server #1 for static file serving and modified via technical users not common users directly.
  • 22. Separate computers Server #2 for running CMS editing softwares and other backend web based software. Output is static files to be automatically placed on server #3 Server #3 for storing and presenting files created by server #2 as static files. No interaction software active.
  • 23. Separate computers All software shall reside on server #2 and Servers #1 and #3 shall only have static HTML and FTP servers for serving files.
  • 24. Separate computers Server #1 shall host the static HTML main pages. Chances of them being defaced with this method are now near zero. A serious zero day is required to do so. Servers #1 and #3 do not have CGI or PHP type stuff enabled.
  • 25. Updates Regular updates need to be done after regular backups of the servers. Some updates can destroy the system and make it nonfunctional.
  • 26. Updates Test updates on development machines before implementing on production machines.
  • 27. Updates For normal servers, updates every month. Admins need to test only the critical security updates on development machines and implement them on the production servers. The other updates are not required as long as the system is working.
  • 28. Updates Unnecessary updates can cause malfunctions and are a waste of time.
  • 29. Logs Check the logs daily to make sure no one is trying to get it. Or at least did not get in. There can be many login entries of tries. Get a log analyzer to help if required.
  • 30. Permissions Check all permissions to make sure no user has more than they need.
  • 31. Apache modules Eliminate or turn off all unused modules of the webserver.
  • 32. Updates Subscribe to security alerts. In case a new security flaw is found. If a new flaw is found, then backup and update the servers in a day on the development server to test. Then update on the production after it works on on the development server.
  • 33. Automated scanners Use automated scanners to check for vulnerabilities. If you have followed the steps mentioned so far, you should get none found from all softwares and systems available.
  • 34. Automated scanners If any are found, they shall be non critical and do not allow user or root level access anywhere you have not allowed specifically.
  • 35. Thanks Thanks for reading. If you have suggestions for improvement, then please email to khawar@atrc.net.pk
  • 36. Thanks Hopefully I can incorporate the ideas into the updates of this one and into other future presentations.
  • 37. Practical Web Server Security By : Khawar Nehal http://atrc.net.pk 5 August 2019 Muftasoft (TM)