passwd Binary Bug
The current method that defense matrix is using to enforce higher password strength seems defective. Therefore we have temporarily disabled the replacement of default system
If you wish to recover your default
passwd binary file, please execute the following command to move the original binary back to its place.
$ sudo mv /usr/bin/oldpasswd /usr/bin/passwd
In the future, we'll be using a more stable, robust and secure way to implement this feature.
1.1.0 (October 20, 2018)
- Rearranged executable files.
- Removed everything that's redundant.
- All tests passed. We are not expecting major bugs.
- Integration with SCUTUM firewall fixed.
- Unified code style (
", function and variable naming scheme)
- Designed for Linux OS
wgetis required for quick install
gitshould be installed
Detailed dependency list can be found in DEPENDENCIES.md
$ sudo bash -c "$(curl -fsSL https://raw.githubusercontent.com/K4YT3X/defense-matrix/master/quickinstall.sh)"
$ sudo bash -c "$(wget https://raw.githubusercontent.com/K4YT3X/defense-matrix/master/quickinstall.sh -O -)"
What is Defense Matrix?
DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimensions automatically. It makes securing a Linux server faster and easier.
Never before have a program been able to have so many security features packed in one. Therefore we provide you with this all-in-one solution that will make the following difficult things easier to handle.
Why do you need Defense Matrix?
During HTN we made a test. Our nameless linux server which is exposed to the internet received roughly 6000 attacks and port scanning attempts every 24 hours.
Defense Matrix features:
- TCP/UDP/ICMP firewall
- ARP firewall
- Rootkit Detection
- Configuration sanity check
- Password complexity check
- Attack analysis and visualization
These basic security features will defend your server(s) against most tech based attacks.
We configure these things automatically for you.
We make this easy for you.e
$ sudo defense-matrix --uninstall
ALL commands require root privilege.
$ sudo openport [port1] [port2] [port3] # Open tcp ports $ sudo closeport [port1] [port2] [port3] # Close tcp ports $ sudo service scutum start # Start scutum service $ sudo service scutum stop # Stop scutum service $ sudo systemctl enable scutum # Start SCUTUM with system $ sudo systemctl disable scutum # Don't start SCUTUM with system $ sudo scutum # Start SCUTUM Normally $ sudo scutum --start # Start SCUTUM Manually for once even it it's disabled $ sudo scutum --enable # Enable SCUTUM (Start automatically on connect) $ sudo scutum --disable # Disable SCUTUM (Don't start automatically on connect) $ sudo scutum --reset # Reset SCUTUM (Allow ALL ARP packages temporarily) $ sudo scutum --purgelog # Purge SCUTUM logs $ sudo scutum --install # Run scutum installation wizard and install SCUTUM into system $ sudo scutum --uninstall # Remove SCUTUM from system completely $ sudo scutum --upgrade # Upgrade SCUTUM and AVALON Framework
Defense Matrix installs a number of security auditing tools for you, and more could be added later. To save you time executing those commands separately, we condense everything in to one command which will execute them all.
$ sudo defense-matrix --audit
Password Complexity Check
passwd binary will be replaced by our enhanced
passwd command, and the old binary file will be backed up at
/usr/bin/oldpasswd. When you change the password using
passwd after installing Defense Matrix, it will require password with higher complexity.
To restore the original passwd binary file:
$ sudo passwd --restore
What if I want to be more secure?
If you still feel unsafe after installing this security suite, we recommend you to look into IDSs and WAFs. Snort will be a good one to begin with.