How to Prevent Symlink Attacks

ad Impact of Symlink - Suppose you own a small hosting company with a Linux Box, & 1337 sites are hosted there. If an attacker gains access to any single site on your server, he can easily create a symbolic link to / directory & then putting the document root afterwards it. Now the attacker can easily read sensitive files, that can be the configuration file of your billing system. Since, he has local access, now he can easily connect to the mysql & pwn all your clients, & the whole company.

How Symlink is Created - A basic linux command is used in creating symlink. i.e,

ln -s source_file link_name

                                     :: 0x02 Protecting ::

Patching Symlink-

1.Change the permission of /bin/ln to 400.

2.Locate php.ini by command- "Locate php.ini” (without quotes) Edit the main php.ini & disable  symlink & proc_open.

3.If you have a shared host, & it is vulnerable to symlink.Then, change the permission of your configuration files to 400. 

4.    Turn PHP safe_mode ON


Was this answer helpful?

 Print this Article

Also Read

Installing Rkhunter (Rootkit Hunter) in RHEL, CentOS and Fedora

Rkhunter (Rootkit Hunter) is an open source Unix/Linux based scanner tool for Linux systems...

How to disable all Apache header information?

Follow the below steps to disable Apache header information. Edit your mail Apache configuration...

Is my server hacked? Lets check it with rootkit hunter

RookHit Hunter is a command-line utility that will search your machine for...

How to Secure PHP from php.ini

PHP's default configuration file, php.ini (usually found in /etc/php.ini on most Linux systems)...

How to Prevent DDOS with CSF

You just need to configure two csf directives, thats it. The two directives are PORTFLOOD and...