under attack Part II

By Posted in - Blog on May 18th, 2016 0 Comments

Short time after cleaning up the infection, the attacks renewed, bringing down the website on periodical basis.

After some digging, it looked like some Chinese based IPs were hitting xmlrpc.php on port 80 and brute forcing ssh on 22.

This information was revealed using ‘tcptrack -i eth0’ and ‘grep sshd /var/log/*’.

‘’ has also been useful in investigating various IPs.

It seemed critical to start ufw, but how does one do that over ssh and make sure not to lock him/her-self out?

‘ufw status’ will not be of much use when disabled.

‘ufw show added’ saved the day – helping to make sure port 22 will remain open when activating the firewall.

Please leave a Comment

Solve : *
30 ⁄ 15 =