JShielder – Automates The Process Of Installing All The Necessary Packages To Host A Web Application And Hardening A Linux Server

JSHielder is an Open Source tool developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application or services. This tool automates the process of installing all the necessary packages to host a web application and Hardening a Linux server with little interaction from the user. Newly added script follows CIS Benchmark Guidance to establish a Secure configuration posture for Linux systems.This tool is a Bash Script that hardens the Linux Server security automatically and the steps followed are:Configures a HostnameReconfigures the TimezoneUpdates the entire SystemCreates a New Admin user so you can manage your server safely without the need of doing remote connections with root.Helps user Generate Secure RSA Keys, so that remote access to your server is done exclusive from your local pc and no Conventional passwordConfigures, Optimize and secures the SSH Server (Some Settings Following CIS Benchmark Ubuntu 16.04)Configures IPTABLES Rules to protect the server from common attacksProtects the server against Brute Force attacks by installing a configuring fail2banStop Portscans by blocking intrusive IP via IPTABLES using portsentryInstall, configure, and optimize MySQLInstall the Apache Web ServerInstall, configure and secure PHPSecure Apache via configuration file and with installation of the Modules ModSecurity, ModEvasive, Qos and SpamHausInstalls RootKit HunterSecures Root Home and Grub Configuration FilesInstalls Unhide to help Detect Malicious Hidden ProcessesInstalls Tiger, A Security Auditing and Intrusion Prevention systemRestrict Access to Apache Config FilesDisable CompilersCreates Daily Cron job for System UpdatesKernel Hardening via sysctl configuration File (Tweaked)Other Hardening StepsAdded PHP Suhosin Installation to protect PHP Code and Core for Known and Unknown flaws (Removed on Ubuntu 16.04)Use of Function for code execution customizationDistro Selection MenuFunction Selection MenuDeployment Selection Menu (LAMP, LEMP, Reverse Proxy)Added LEMP Deployment with ModSecurityAdded /tmp folder HardeningAdded PSAD IDS installationAdded Process AccountingAdded Unattended UpgradesAdded MOTD and Banners for Unauthorized accessDisable USB Support for Improved Security (Optional)Restrictive Default UMASKAdded Additional Hardening StepsAuditd installSysstat installArpWatch installHardening steps following CIS BenchmarkSecures CronDisables Unused Filesystems and Uncommon Network protocolsConfigure Auditd rules following CIS benchmark (Ubuntu 16.04)Automates the process of setting a GRUB Bootloader PasswordSecures Boot SettingsSets Secure File Permissions for Critical System FilesNEWLY ADDED FUNCTIONSeparate Hardening Script Following CIS Benchmark Guidance https://www.cisecurity.org/benchmark/ubuntu_linux/ (Ubuntu 16.04)To Run the tool./jshielder.shAs the Root userIssuesHaving Problems, please open a New Issue for JShielder on Github.Distro AvailabilityUbuntu Server 14.04LTSUbuntu Server 16.04LTSNotesAfter Final Release of Ubuntu 18.04LTS, will not be maintaining Jshielder for Ubuntu 14.04. Will focus on last 2 major LTS Releases.ChangeLogv2.3 More Hardening steps Following some CIS Benchmark items for LAMP Deployerv2.2.1 Removed suhosing installation on Ubuntu 16.04, Fixed MySQL Configuration, GRUB Bootloader Setup function, Server IP now obtain via ip route to not rely on interface namingv2.2 Added new Hardening option following CIS Benchmark Guidancev2.1 Hardened SSH Configuration, Tweaked Kernel Security Config, Fixed iptables rules not loading on Boot. Added auditd, sysstat, arpwatch install.v2.0 More Deployment Options, Selection Menu, PHP Suhosin installation, Cleaner Code,v1.0 – New CodeDeveloped by Jason Sotohttps://www.jasonsoto.comhttps://github.com/jsitechTwitter = @JsiTechDownload JShielder

Link: http://feedproxy.google.com/~r/PentestTools/~3/YI0WA71K2Mw/jshielder-automates-process-of.html