<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Archives des cybersécurité - CoffeeBreak Info</title>
	<atom:link href="https://coffeebreak.en-images.info/tag/cybersecurite/feed/" rel="self" type="application/rss+xml" />
	<link>https://coffeebreak.en-images.info/tag/cybersecurite/</link>
	<description>Une petite pause :)</description>
	<lastBuildDate>Sat, 25 Jun 2022 13:38:46 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://coffeebreak.en-images.info/wp-content/uploads/2021/07/cropped-Tasse_Cafe-scaled-1-32x32.jpg</url>
	<title>Archives des cybersécurité - CoffeeBreak Info</title>
	<link>https://coffeebreak.en-images.info/tag/cybersecurite/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>MODOP – Bloquer les IP Botnet malveillant</title>
		<link>https://coffeebreak.en-images.info/modop-bloquer-les-ip-botnet-malveillant/</link>
					<comments>https://coffeebreak.en-images.info/modop-bloquer-les-ip-botnet-malveillant/#respond</comments>
		
		<dc:creator><![CDATA[chris]]></dc:creator>
		<pubDate>Fri, 27 May 2022 11:37:00 +0000</pubDate>
				<category><![CDATA[RedHat/Centos Linux]]></category>
		<category><![CDATA[Sécurité]]></category>
		<category><![CDATA[Système]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[cybersécurité]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[RockyLinux]]></category>
		<category><![CDATA[Serveur]]></category>
		<guid isPermaLink="false">https://coffeebreak.en-images.info/?p=6691</guid>

					<description><![CDATA[<p>MODOP sur la mise en place d’un script BASH permettant de bloquer des IP de Botnet sur vos serveurs de Production afin d’éviter d’éventuelles attaques groupées. Le principe est de s’appuyer sur un site de veille en cybersécurité et ainsi récupérer la liste journalière des Botnet référencés. Le script inscrira dans le Firewall un « REJECT » Pour chaque IP Botnet désignées dans la liste . Une tâche Crontab devrait permettre de mettre à jour le firewall à chaque édition du fichier de veille Botnet.</p>
<p>L’article <a href="https://coffeebreak.en-images.info/modop-bloquer-les-ip-botnet-malveillant/">MODOP – Bloquer les IP Botnet malveillant</a> est apparu en premier sur <a href="https://coffeebreak.en-images.info">CoffeeBreak Info</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #000000;"><strong>Le but </strong></span></h3>
<p><span style="color: #000000;">Lancer un script BASH permettant de récupérer une liste d’IP Botnet malveillant une fois par jour via crontab ,&nbsp; afin de les ajouter à vos règles firewall.</span></p>
<ul>
<li><a href="https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt">https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt</a></li>
</ul>
<p><img fetchpriority="high" decoding="async" width="1036" height="508" class="wp-image-6692" src="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-202.png" srcset="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-202.png 1036w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-202-300x147.png 300w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-202-1024x502.png 1024w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-202-768x377.png 768w" sizes="(max-width: 1036px) 100vw, 1036px" /></p>
<h3><span style="color: #000000;"><strong>Création du répertoire Projet</strong></span></h3>
<pre>[root@XXXXXXXX chris]#<span style="color: #ff0000;"> mkdir Ban_BotNet</span>
[root@XXXXXXXX chris]# # <span style="color: #ff0000;">cd Ban_BotNet</span></pre>
<h3><span style="color: #000000;"><strong>Installation Dos2unix </strong></span></h3>
<pre>[root@XXXXXXXX Ban_BotNet]# <span style="color: #ff0000;">yum install dos2unix</span></pre>
<h3><span style="color: #000000;"><strong>Le Script</strong></span></h3>
<pre><span style="color: #ff0000;"><em style="color: #ff0000;">#!/bin/bash</em>
<em style="color: #ff0000;">
APP_LOG=BanBotnet.log</em>
<em style="color: #ff0000;">APP_HOME=/home/chris/Ban_BotNet</em>
<em style="color: #ff0000;">URL_BOT=https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt</em>
<em style="color: #ff0000;">CE_JOUR=`date +%F`</em>

<em style="color: #ff0000;">echo "-------------------------------------------"</em>
<em style="color: #ff0000;">echo " Suppression des fichiers périmés J-1 "</em>
<em style="color: #ff0000;">echo "-------------------------------------------"</em>
<em style="color: #ff0000;">echo ""</em>
<em style="color: #ff0000;">
if [[ -f $APP_HOME/ipblocklist_recommended-1.txt ]]</em>
<em style="color: #ff0000;">then</em>
<em style="color: #ff0000;"> echo "On efface le fichier d'hier..."</em>
<em style="color: #ff0000;"> rm -f $APP_HOME/ipblocklist_recommended-1.txt</em>
<em style="color: #ff0000;">fi</em>

<em style="color: #ff0000;">if [[ -f $APP_HOME/ipblocklist_recommended.txt ]]</em>
<em style="color: #ff0000;">then</em>
<em style="color: #ff0000;"> echo "On efface le fichier d'hier..."</em>
<em style="color: #ff0000;"> rm -f $APP_HOME/ipblocklist_recommended.txt</em>
<em style="color: #ff0000;">fi</em>

<em style="color: #ff0000;">if [[ -f $APP_HOME/ip_firewall_block.txt ]]</em>
<em style="color: #ff0000;">then</em>
<em style="color: #ff0000;"> echo "On efface le fichier d'hier..."</em>
<em style="color: #ff0000;"> rm -f $APP_HOME/ip_firewall_block.txt</em>
<em style="color: #ff0000;">fi</em>

<em style="color: #ff0000;">echo "-------------------------------------------"</em>
<em style="color: #ff0000;">echo "On récupère le fichier des BOTNET du jour "</em>
<em style="color: #ff0000;">echo "-------------------------------------------"</em>
<em style="color: #ff0000;">echo ""</em>
<em style="color: #ff0000;">wget -O - https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt |grep -v "#" &gt;&gt; $APP_HOME/ipblocklist_recommended.txt</em>
<em style="color: #ff0000;">touch $APP_HOME/ipblocklist_recommended-1.txt</em>
<em style="color: #ff0000;">dos2unix -850 -n $APP_HOME/ipblocklist_recommended.txt $APP_HOME/ipblocklist_recommended-1.txt</em>

<em style="color: #ff0000;">echo "-------------------------------------------"</em>
<em style="color: #ff0000;">echo "On récupère la liste des IP déjà bloquées "</em>
<em style="color: #ff0000;">echo "-------------------------------------------"</em>
<em style="color: #ff0000;">echo ""</em>
<em style="color: #ff0000;">firewall-cmd --list-all &gt;&gt; $APP_HOME/ip_firewall_block.txt</em>

<em style="color: #ff0000;">## Traitement des IP à Bannir</em>
<em style="color: #ff0000;">for IP in `cat $APP_HOME/ipblocklist_recommended-1.txt`</em>
<em style="color: #ff0000;"> do</em>
<em style="color: #ff0000;"> ## Verifie si Déja Bloqué</em>
<em style="color: #ff0000;"> FIRE=`cat $APP_HOME/ip_firewall_block.txt |grep $IP |wc -l`</em>
<em style="color: #ff0000;"> if [[ $FIRE != 0 ]]</em>
<em style="color: #ff0000;"> then</em>
<em style="color: #ff0000;">
 echo "-----------------------------------------------------------------"</em>
<em><span style="color: #ff0000;"> echo "Cette IP : $IP est déjà bloquée dans le Firewall"</span></em>
<em style="color: #ff0000;"> echo "-----------------------------------------------------------------"</em>
<em><span style="color: #ff0000;"> echo "$CE_JOUR : $IP est déjà bloquée dans le Firewall" &gt;&gt; $APP_HOME/$APP_LOG</span></em>

<em style="color: #ff0000;">else</em>
<em style="color: #ff0000;"> echo "-----------------------------------------------------------------"</em>
<em style="color: #ff0000;"> echo " Mise en Reject de l'IP : $IP dans le Firewall"</em>
<em style="color: #ff0000;"> echo "-----------------------------------------------------------------"</em>
<strong><em style="color: #ff0000;"> firewall-cmd --add-rich-rule='rule family=ipv4 source address='$IP' reject' --permanent</em></strong>
<em style="color: #ff0000;"> echo "$CE_JOUR : $IP ajouter dans le Firewall" &gt;&gt; $APP_HOME/$APP_LOG</em>
<em style="color: #ff0000;"> echo ""</em>
<em style="color: #ff0000;"> fi</em>
<em style="color: #ff0000;"> done</em>

<em style="color: #ff0000;">echo "------------------------------------------------------------"</em>
<em style="color: #ff0000;">echo "Application des nouvelles règles de Blocage sur le Firewall "</em>
<em style="color: #ff0000;">echo "------------------------------------------------------------"</em>
<em style="color: #ff0000;">echo ""</em>

<em style="color: #ff0000;">firewall-cmd --reload</em></span></pre>
<h3><span style="color: #000000;"><strong>Lancement du Script</strong></span></h3>
<pre>[root@ XXXXXXXX Ban_BotNet]# <span style="color: #ff0000;">./Bannir_Botnet.sh</span></pre>
<p><img decoding="async" width="1584" height="385" class="wp-image-6693" src="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-203.png" srcset="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-203.png 1584w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-203-300x73.png 300w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-203-1024x249.png 1024w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-203-768x187.png 768w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-203-1536x373.png 1536w" sizes="(max-width: 1584px) 100vw, 1584px" /></p>
<p>Lancement du script et récupération des prérequis pour le traitement des IP à Bannir</p>
<p><img decoding="async" width="1001" height="549" class="wp-image-6694" src="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-204.png" srcset="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-204.png 1001w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-204-300x165.png 300w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-204-768x421.png 768w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-204-800x440.png 800w" sizes="(max-width: 1001px) 100vw, 1001px" /></p>
<p>Lancement des bannissements des IP s’ils ne sont pas présente dans le Firewall.</p>
<p><img loading="lazy" decoding="async" width="781" height="233" class="wp-image-6695" src="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-205.png" srcset="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-205.png 781w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-205-300x90.png 300w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-205-768x229.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></p>
<p>Application des nouveaux bannissements dans les «&nbsp;Rules&nbsp;» du firewall.</p>
<pre>[root@XXXXXXXX Ban_BotNet]# <span style="color: #ff0000;">firewall-cmd --list-all</span></pre>
<p><img loading="lazy" decoding="async" width="755" height="479" class="wp-image-6696" src="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-206.png" srcset="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-206.png 755w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-206-300x190.png 300w" sizes="auto, (max-width: 755px) 100vw, 755px" /></p>
<p>IP des BotNet bloquées par votre Firewall.</p>
<h3><span style="color: #000000;"><strong>Dans le log de notre Script</strong></span></h3>
<pre>[root@XXXXXXXX Ban_BotNet]#<span style="color: #ff0000;"> cat BanBotnet.log</span></pre>
<p><img loading="lazy" decoding="async" width="788" height="400" class="wp-image-6697" src="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-207.png" srcset="https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-207.png 788w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-207-300x152.png 300w, https://coffeebreak.en-images.info/wp-content/uploads/2022/05/word-image-207-768x390.png 768w" sizes="auto, (max-width: 788px) 100vw, 788px" /></p>


<p>Il vous reste à présent , de positionner votre script dans un crontab tous les matins à 6H00</p>



<p></p>
<p>Views: 28</p><p>L’article <a href="https://coffeebreak.en-images.info/modop-bloquer-les-ip-botnet-malveillant/">MODOP – Bloquer les IP Botnet malveillant</a> est apparu en premier sur <a href="https://coffeebreak.en-images.info">CoffeeBreak Info</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coffeebreak.en-images.info/modop-bloquer-les-ip-botnet-malveillant/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
