Securing a dedicated Linux Debian 12 server — Complete post-incident guide
Complete security audit of a Debian 12 server after a brute force attack: custom fail2ban, SSH/SFTP chroot, auditd, permissions, automated AI audit, Docker, HTTP headers.
Opening excerpt (first ~120 words) tap to expand
try { if(localStorage) { let currentUser = localStorage.getItem('current_user'); if (currentUser) { currentUser = JSON.parse(currentUser); if (currentUser.id === 3833552) { document.getElementById('article-show-container').classList.add('current-user-is-article-author'); } } } } catch (e) { console.error(e); } Odilon HUGONNOT Posted on Apr 30 • Originally published at web-developpeur.com Securing a dedicated Linux Debian 12 server — Complete post-incident guide #scurit #linux #debian #fail2ban An ordinary Tuesday morning. I glance at Apache logs before starting work — a conditioned reflex, rarely useful. Except that morning. In error.log, hundreds of identical lines, all from the same IP: 13.37.248.113.
…
Excerpt limited to ~120 words for fair-use compliance. The full article is at DEV.to (Top).