ModSecurity: OWASP teknik menambahkan

From OnnoWiki
Revision as of 19:29, 13 May 2017 by Onnowpurbo (talk | contribs) (Created page with "sumber: https://www.rosehosting.com/blog/install-mod_security-with-the-owasp-core-rule-set-on-a-centos-vps/ Install mod_security with the OWASP core rule set on a CentOS VPS...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

sumber: https://www.rosehosting.com/blog/install-mod_security-with-the-owasp-core-rule-set-on-a-centos-vps/


Install mod_security with the OWASP core rule set on a CentOS VPS

   September 21, 2014
   4
   Tutorials

Facebook0 Twitter1 Google+1 Linkedin0

mod-security-raise-up-your-apache-webserver-security-and-protect-against-cross-site-scripting-javascript-hacks-and-virusesMod_Security is free and open source web application firewall for Apache and Nginx. It is very useful for protecting your web server from various attacks by blocking most of the known exploits using regular expressions and rule sets. Mod_security can detect attacks by monitoring and analyzing the HTTP traffic in real time. In this blog tutorial we will guide you through the process of installing mod_security with the OWASP (Open Web Application Security Project) core rule set on a CentOS VPS from source. Log in to your your server as user ‘root’ and make sure that all packages are up to date:

yum -y update

Before we start the installation of mod_security, we need to install the following dependencies first

yum install gcc make httpd-devel libxml2 pcre-devel libxml2-devel curl-devel git

Download the mod_security source code from their official website to your server

cd /opt/ wget https://www.modsecurity.org/tarball/2.9.1/modsecurity-2.9.1.tar.gz

Extract the downloaded archive and change the current working directory to the newly extracted directory

tar xzfv modsecurity-2.9.1.tar.gz cd modsecurity-2.9.1

Now, lets configure, compile and install mod_security from the source code

./configure make make install

Copy the default mod_security configuration and the unicode.mapping file to the necessary Apache directory

cp modsecurity.conf-recommended /etc/httpd/conf.d/modsecurity.conf cp unicode.mapping /etc/httpd/conf.d/

With this step, mod_security is installed on your server. Now we need to configure the Apache web server. Open the web server configuration file and add the following line

nano /etc/httpd/conf/httpd.conf LoadModule security2_module modules/mod_security2.so LoadModule unique_id_module modules/mod_unique_id.so

Save the changes and restart Apache

/etc/init.d/httpd restart

Download and configure OWASP (Open Web Application Security Project) core rule set for a base configuration

cd /etc/httpd git clone https://github.com/SpiderLabs/owasp-modsecurity-crs.git mv owasp-modsecurity-crs modsecurity-crs cd modsecurity-crs cp modsecurity_crs_10_setup.conf.example modsecurity_crs_10_config.conf

Open the Apache configuration file again, and add the following lines at the end of the flie

   Include modsecurity-crs/modsecurity_crs_10_config.conf
   Include modsecurity-crs/base_rules/*.conf

Save the file and restart the web server again

/etc/init.d/httpd restart

That’s all. You have mod_security with the OWASP core rule set installed on your CentOS VPS. Of course you don’t have to do any of this if you use one of our Linux VPS hosting services, in which case you can simply ask our expert Linux admins to install Mod_security for you. They are available 24×7 and will take care of your request immediately.


Referensi