{"id":38,"date":"2013-08-31T14:54:42","date_gmt":"2013-08-31T14:54:42","guid":{"rendered":"https:\/\/www.eqservers.com\/blog\/?p=38"},"modified":"2013-08-31T14:54:42","modified_gmt":"2013-08-31T14:54:42","slug":"install-brute-force-detection-dedicated-server","status":"publish","type":"post","link":"https:\/\/www.eqservers.com\/blog\/install-brute-force-detection-dedicated-server\/","title":{"rendered":"Install Brute Force Detection on your Dedicated Server"},"content":{"rendered":"<p>Brute Force Detection is a modular shell script for parsing applicable logs and checking for authentication failures.<\/p>\n<p><!--more--><\/p>\n<p>Hackers use the brute force method to gain access to a server these days. Installation, configuration and usage of this script is pretty simple and anybody can work with this.<\/p>\n<p>Brute Force Detection is available at: <a rel=\"nofollow\" href=\"http:\/\/www.rfxnetworks.com\/bfd.php\" title=\"BFD\" target=\"_blank\">http:\/\/www.rfxnetworks.com\/bfd.php<\/a><\/p>\n<p>This guide will show you how to install and configure BFD to protect your dedicated server from brute force hack attempts.<\/p>\n<p><strong>Requirements:<\/strong><\/p>\n<ul>\n<li>You MUST have APF Firewall Installed before installing BFD &#8211; it works with APF and requires some APF files to operate.<\/li>\n<li>Root SSH access to your server.<\/li>\n<\/ul>\n<p>Login to your server through SSH and su to the root user.<\/p>\n<p>1. <quote>cd \/root\/downloads<\/quote> or another temporary folder where you store your files.<\/p>\n<p>2. <quote>wget http:\/\/www.rfxnetworks.com\/downloads\/bfd-current.tar.gz<\/quote><\/p>\n<p>3. <quote>tar -xvzf bfd-current.tar.gz<\/quote><\/p>\n<p>4. <quote>cd bfd-0.2<\/quote><\/p>\n<p>5. Run the install file: .\/install.sh<\/p>\n<p>You will receive a message saying it has been installed<\/p>\n<p><quote>.: BFD installed<br \/>\nInstall path: \/usr\/local\/bfd<br \/>\nConfig path: \/usr\/local\/bfd\/conf.bfd<br \/>\nExecutable path: \/usr\/local\/sbin\/bfd<\/quote><\/p>\n<p>6. Lets edit the configuration file: pico \/usr\/local\/bfd\/conf.bfd<\/p>\n<p>7. Enable brute force hack attempt alerts:<br \/>\nFind: ALERT_USR=&#8221;0&#8243; CHANGE TO: ALERT_USR=&#8221;1&#8243;<\/p>\n<p>Find: EMAIL_USR=&#8221;root&#8221; CHANGE TO: EMAIL_USR=&#8221;your@yourdomain.com&#8221;<\/p>\n<p>Save the changes: Ctrl+X then Y<\/p>\n<p>8. Prevent locking yourself out!<br \/>\npico -w \/usr\/local\/bfd\/ignore.hosts and add your own trusted IPs<br \/>\nEg: 192.168.1.1<\/p>\n<p>Save the changes: Ctrl+X then Y<\/p>\n<p>BFD uses APF&#8217; cli insert feature and as such will override any allow_hosts.rules entries users have in-place. So be sure to add your trusted ip addresses to the ignore file to prevent locking yourself out.<\/p>\n<p>9. Run the program!<br \/>\n\/usr\/local\/sbin\/bfd -s<\/p>\n<p>We hope you find this tutorial very useful and easy to understand. Do not hesitate to ask your questions about this tutorial via comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brute Force Detection is a modular shell script for parsing applicable logs and checking for authentication failures.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[9],"class_list":["post-38","post","type-post","status-publish","format-standard","hentry","category-dedicated-server-tutorials","tag-brute-force"],"_links":{"self":[{"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/posts\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":1,"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/posts\/38\/revisions"}],"predecessor-version":[{"id":39,"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/posts\/38\/revisions\/39"}],"wp:attachment":[{"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/media?parent=38"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/categories?post=38"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eqservers.com\/blog\/wp-json\/wp\/v2\/tags?post=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}