Skip to content

How to use Anti-intrusion

What can it achieve?

  1. Realize the command record of all users
  2. Protect the security of the website. Prevent web users from executing commands
  3. Defense against mining caused by redis opening external ports
  4. Achieving real-time response and troubleshooting

How to install and use:

Click App Store and then go to Professional to install Anti-intrusionalt text

Anti-intrusion preview

alt text

Attack test

The Attack test here is to execute the su www command on the command line (it will not cause any impact on your system or website) alt textalt textalt text

  1. Defense testing for websites First delete php system function from Disabled functions, then restart php (After the test is complete, be sure to add the "system" function back to "Disabled functions" and restart php) alt textalt text

  2. Add a php file to the tested website The content is shown in the figure: alt text

  3. Visit the test URL, remember to add ?shell=id such as mine: http://192.168.247.129/11.php?shell=id

  4. This is the effect of turning on "Anti-intrusion": alt text

  5. This is without or OFF "Anti-intrusion" effect, you can directly get the user's ID: alt text

  6. View the log of intrusion interception: You can see what operations have been done: User, Run path, Command executed, Time. alt text

  7. The website test is complete, add the system function back to "Disabled functions", and restart phpalt text

Defense effect of redis:

alt text

Defense effect of Mysql:

After Mysql invades, functions such as sys_eval will be added. Here, sys_eval is used to escalate privileges to execute commands. If "Anti-intrusion" is not enabled, the system command whoami can be executed directly, as shown in the figure: alt textalt text

After enabling "Anti-intrusion", and Mysql is Protection enabled (default enabled), the effect is as shown in the figure: alt text