{"id":2796,"date":"2020-02-24T10:16:13","date_gmt":"2020-02-24T04:46:13","guid":{"rendered":"https:\/\/www.24x7serversupport.com\/blog\/?p=2796"},"modified":"2020-11-24T02:55:07","modified_gmt":"2020-11-23T21:25:07","slug":"where-can-you-find-security-loopholes-on-the-servers","status":"publish","type":"post","link":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/","title":{"rendered":"Where can you find security loopholes on the servers?"},"content":{"rendered":"\n<p>This article only serves to give you a brief overview of the\nsecurity flaws on the servers and to show you the possibilities which are open\nto you to analyze the errors.<\/p>\n\n\n\n<p>Furthermore, compromised server structures are too complex\nto describe clear ways to solve your problems.<\/p>\n\n\n\n<p>If you have little experience in server administration, we\nrecommend that you use analysis tools.<\/p>\n\n\n\n<p>Checkrootkit:&nbsp;http:\/\/www.chkrootkit.org\/&nbsp;<\/p>\n\n\n\n<p>Rootkit Hunter:&nbsp;http:\/\/www.rootkit.nl\/projects\/rootkit_hunter.html<\/p>\n\n\n\n<p><strong>Tip<\/strong>&nbsp;: we also recommend that you install the SSH service on your Linux server even more securely and offer you, as a user manual, the following article from the FAQ of STRATO FAQ:&nbsp;How can I install, even more securely, the SSH service on a Linux server?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security breaches: <\/strong><\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. Installed software <\/strong><\/h4>\n\n\n\n<p>The software \/ services installed on the server (qmail,\nApache, FTP, MySQL, etc.) can present security vulnerabilities.&nbsp;It is very\neasily possible for third parties to know which software is installed on your\nserver (example: nmap -A HOST [indicates open ports and which software \/\nsoftware version is running on this port]).&nbsp;In the event of known security\nbreaches, burglary is then relatively easy.<\/p>\n\n\n\n<p><strong>Preventive measures you should pay attention to<\/strong>&nbsp;: regular updates of the software you use.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. Dynamic websites <\/strong><\/h4>\n\n\n\n<p>In general, we can say that security holes are very often\npresent on dynamic websites.&nbsp;Most content management systems, forums,\nblogs, boards, etc.&nbsp;offer file upload possibilities (Joomla, Mambo,\nPostNuke, phpBB, TYPO3, WordPress, etc.).<\/p>\n\n\n\n<p>It is therefore possible that faulty files are encrypted on\nthe server.&nbsp;Security flaws can however also come from poor programming of\nthese dynamic systems.&nbsp;Regarding the usual content management systems, security\nvulnerabilities are detected and patches are offered quickly.&nbsp;This is why\nwe recommend that you regularly update the systems you use.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3. PHP settings<\/strong><\/h4>\n\n\n\n<p>Bad PHP settings can also cause security breaches.&nbsp;This\nis especially true for the options register_globals and safe_mode.<\/p>\n\n\n\n<p>If the PHP option register_globals is activated (ON), it is\nrelatively easy for third parties to encrypt the PHP code (manipulation of the\nvariable, injection of the code).&nbsp;This is the reason why it is recommended\nhere to set this value to OFF.<\/p>\n\n\n\n<p>This also applies to the PHP option safe_mode.&nbsp;If the\nsafe_mode option is OFF, third parties can also compromise the\nserver.&nbsp;This is why we recommend that you also activate the safe_mode\noption here.&nbsp;An even safer alternative would be to use PHP as a program\n(suPHP) instead of the Apache module.<br>\n<br>\nWhat to do when the server is compromised?<\/p>\n\n\n\n<p>You should first try to identify the process.&nbsp;To do\nthis, focus on the following points:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Monitor traffic on the network card at regular intervals (tools:&nbsp;<strong>ifconfig, netstat<\/strong>&nbsp;).&nbsp;Excessive traffic can be a clue;<\/li><li>Check for the presence of unusual \/ unknown ports on which there are unusual \/ unknown programs (for example with&nbsp;<strong>netstat -anp<\/strong>&nbsp;):<\/li><li>Display processes and find and terminate unknown \/ unusual ones (for example using&nbsp;<strong>ps axf  -Aef<\/strong>&nbsp;);&nbsp;Note: Always delete the parent process, since deleting child processes often does not have the desired effect;<\/li><li>Examine the advanced attributes of the file.&nbsp;Malicious files \/ scripts can have advanced      file attributes (usually the i attribute that prevents deletion of these files).<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This article only serves to give you a brief overview of the security flaws on the servers and to show you the possibilities which are open to you to analyze the errors. Furthermore, compromised server structures are too complex to describe clear ways to solve your problems. If you have little experience in server administration, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2797,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[210],"tags":[226,150,225,224,223],"class_list":["post-2796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-hardening","tag-security","tag-security-hardening","tag-security-and-hardening","tag-server-security"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Where can you find security loopholes on the servers? | 24x7serversupport Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Where can you find security loopholes on the servers? | 24x7serversupport Blog\" \/>\n<meta property=\"og:description\" content=\"This article only serves to give you a brief overview of the security flaws on the servers and to show you the possibilities which are open to you to analyze the errors. Furthermore, compromised server structures are too complex to describe clear ways to solve your problems. If you have little experience in server administration, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"24x7serversupport Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-24T04:46:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-23T21:25:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1289\" \/>\n\t<meta property=\"og:image:height\" content=\"671\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"24x7support\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@24x7serversuppo\" \/>\n<meta name=\"twitter:site\" content=\"@24x7serversuppo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"24x7support\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/\",\"name\":\"Where can you find security loopholes on the servers? | 24x7serversupport Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1\",\"datePublished\":\"2020-02-24T04:46:13+00:00\",\"dateModified\":\"2020-11-23T21:25:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1\",\"width\":1289,\"height\":671,\"caption\":\"Server Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.24x7serversupport.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Where can you find security loopholes on the servers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#website\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/\",\"name\":\"24x7serversupport Blog\",\"description\":\"Linux | CPanel | WHM | webhosting| Plesk | DirectAdmin | CentOs | Debian | Ubuntu Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.24x7serversupport.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401\",\"name\":\"24x7support\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/author\/24x7support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Where can you find security loopholes on the servers? | 24x7serversupport Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/","og_locale":"en_US","og_type":"article","og_title":"Where can you find security loopholes on the servers? | 24x7serversupport Blog","og_description":"This article only serves to give you a brief overview of the security flaws on the servers and to show you the possibilities which are open to you to analyze the errors. Furthermore, compromised server structures are too complex to describe clear ways to solve your problems. If you have little experience in server administration, [&hellip;]","og_url":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/","og_site_name":"24x7serversupport Blog","article_published_time":"2020-02-24T04:46:13+00:00","article_modified_time":"2020-11-23T21:25:07+00:00","og_image":[{"width":1289,"height":671,"url":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1","type":"image\/png"}],"author":"24x7support","twitter_card":"summary_large_image","twitter_creator":"@24x7serversuppo","twitter_site":"@24x7serversuppo","twitter_misc":{"Written by":"24x7support","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/","url":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/","name":"Where can you find security loopholes on the servers? | 24x7serversupport Blog","isPartOf":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1","datePublished":"2020-02-24T04:46:13+00:00","dateModified":"2020-11-23T21:25:07+00:00","author":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401"},"breadcrumb":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#primaryimage","url":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1","width":1289,"height":671,"caption":"Server Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.24x7serversupport.com\/blog\/where-can-you-find-security-loopholes-on-the-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.24x7serversupport.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Where can you find security loopholes on the servers?"}]},{"@type":"WebSite","@id":"https:\/\/www.24x7serversupport.com\/blog\/#website","url":"https:\/\/www.24x7serversupport.com\/blog\/","name":"24x7serversupport Blog","description":"Linux | CPanel | WHM | webhosting| Plesk | DirectAdmin | CentOs | Debian | Ubuntu Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.24x7serversupport.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401","name":"24x7support","url":"https:\/\/www.24x7serversupport.com\/blog\/author\/24x7support\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.24x7serversupport.com\/blog\/wp-content\/uploads\/2020\/02\/server-security.png?fit=1289%2C671&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/comments?post=2796"}],"version-history":[{"count":2,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2796\/revisions"}],"predecessor-version":[{"id":3276,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2796\/revisions\/3276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/media\/2797"}],"wp:attachment":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/media?parent=2796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/categories?post=2796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/tags?post=2796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}