We are happy to announce that Vesta is back under active development as of 25 February 2024. We are working on v1 candidate and expect to engage more with the community over the coming months. We are committed to open source, and we encourage contributors to help us build the future of Vesta.
Search found 73 matches
- Mon May 20, 2019 8:55 pm
- Forum: Modification & Patches
- Topic: Maldetect + ClamAV realtime virus monitoring and protection [Installer script for CentOS]
- Replies: 3
- Views: 23858
Maldetect + ClamAV realtime virus monitoring and protection [Installer script for CentOS]
In case you want to monitor viruses in realtime on your VestaCP installation, with Maldetect and extended ClamAV signatures, I created installer when I realized I did this too many times manually so far. https://github.com/lukapaunovic/vesta-realtime-virus-monitoring-installer/blob/master/installer.sh
- Fri Sep 28, 2018 2:36 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 801965
Re: All VestaCP installations being attacked
We are at DEFCON 1
- Wed Sep 26, 2018 6:08 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 801965
Re: All VestaCP installations being attacked
I have my vps hosted at EU OVH. The same machine has been hacked twice with ubuntu 18 and debian 8, both with the latest version of vesta. All the logs have been deleted. I'm trying to make a tail -f /var/log/......log before OVH blocks my VPS. reboot it to rescue asap, then mount the disk and cont...
- Wed Sep 26, 2018 12:42 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 801965
Re: All VestaCP installations being attacked
Reverse shell is activated when access is GAINED. when a vulnerability is EXPLOITED.
E.g. you manage to upload a shell script to vuln. upload form, and then you run this via exec and viola you have SSH under user script running.
I do not think that he meant there's a shell virus in all vesta.
E.g. you manage to upload a shell script to vuln. upload form, and then you run this via exec and viola you have SSH under user script running.
I do not think that he meant there's a shell virus in all vesta.
- Wed Sep 26, 2018 12:29 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 801965
Re: All VestaCP installations being attacked
There are things called "callback" that connect from the inside to the outside giving a shell. 100% not true, because, if something ''inside'' is ''calling'', then all datacenters will be hacked - in Europe you have very big datacenters that is completly UNTOUCHED by this hack. Why? Because only OV...
- Tue Sep 25, 2018 3:07 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 801965
Re: All VestaCP installations being attacked
OVH....
They are always being targeted, along with Digital Ocean.
Some people who use Hetzner aren't having issues because bots aren't scanning those IP ranges.
They are just 'lucky'. That doesn't mean issue/vulnerability is not present.
They are always being targeted, along with Digital Ocean.
Some people who use Hetzner aren't having issues because bots aren't scanning those IP ranges.
They are just 'lucky'. That doesn't mean issue/vulnerability is not present.
- Tue Sep 25, 2018 2:30 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 801965
Re: All VestaCP installations being attacked
I just want to report I have two customers whose servers were recently reinstalled and everything was clean. They got hacked and their server suspended for outbound DoS They had mod_security with Comodo WAF rules implemented on apache.... also maldetect... chkrootkit... And also had these functions ...
- Thu Sep 20, 2018 11:24 pm
- Forum: DNS Server
- Topic: Change mail._domainkey DKIM
- Replies: 2
- Views: 6849
Re: Change mail._domainkey DKIM
I needed this, and it works. Thanks!
Just one more thing,
in exim conf
under remote_smtp
needs to be changed too :)
Just one more thing,
in exim conf
Code: Select all
dkim_selector = mail
needs to be changed too :)
- Tue May 01, 2018 7:58 pm
- Forum: Modification & Patches
- Topic: [HOWTO] Lossless image optimization of all VestaCP sites
- Replies: 2
- Views: 48523
Re: [HOWTO] Lossless image optimization of all VestaCP sites
Yes, it could be added to cron. But the only flaw here is that when you run it again it will go through all already optimized images, it will detect they are optimized but that loses a lot of time. Here is an example of a cron create /home/images.sh with content: VESTA=/usr/local/vesta export VESTA ...
- Sun Apr 22, 2018 9:59 am
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 757633
Re: Got 10 VestaCP servers exploited
Disable functions like dpeca suggested. And implement mod security