How to scan your websites for malware with ISPProtect – TechRepublic

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.
We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.
Invalid email/username and password combination supplied.
An email has been sent to you with instructions on how to reset your password.
By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy.
You will also receive a complimentary subscription to TechRepublic’s News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.
Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).
How to scan your websites for malware with ISPProtect
Your email has been sent
Websites should be scanned regularly for malware. Jack Wallen shows you how to do this on Linux with the help of ISPProtect.
If you are a website admin, you know full well how important it is to keep your sites free from malware. After all, you don’t want to be serving up malicious code to unsuspecting users. So, what do you do? Do you rely on a typical malware scanner and hope it is capable of doing specific scans for specific file types on your web server’s document root (or your site’s data directory)? And what if your websites are being served up on the Linux platform (which they probably are)?
If that sounds like a scenario fitting your typical use-cases, there’s a very handy, command-line tool you can turn to … ISPProtect.
SEE: Password breach: Why pop culture and passwords don’t mix (free PDF) (TechRepublic)
ISPProtect is a malware scanner specifically designed for web servers and is capable of scanning for malicious files on all types of sites (including the likes of WordPress, Xoops, Joomla and Drupal. This scanner features:
ISPProtect isn’t free. You can use it on a trial basis, but eventually, you’ll have to purchase either a per-scan license or a yearly license. You can purchase “packs” of scans (5, 10, 25, 50, 100) or you can purchase the yearly license for about $92. Find out more information on costs on the ISPProtect price page.
I’m going to walk you through the process of installing and using ISPProtect on AlmaLinux.
The only things you’ll need are a running instance of AlmaLinux (I’ll assume you have a web server running as well) and a user with sudo privileges. With those in hand, let’s protect those sites.
The first thing we’re going to do is install the dependencies. Log into AlmaLinux and install those packages with:
sudo dnf install php php-curl clamav -y
If you’re using a Ubuntu-based server distribution, the command to install the dependencies would be:
sudo apt-get install php7.4-cli php7.4-curl clamav -y
Switch to the admin user with:
su
Next, we’re going to create a directory to house the software with:
mkdir -p /usr/local/ispprotect
Give that new directory the proper permissions with the following commands:
chown -R root:root /usr/local/ispprotect
chmod -R 750 /usr/local/ispprotect
Change into the newly created directory with:
cd /usr/local/ispprotect
Download ISPProtect with the command:
wget http://www.ispprotect.com/download/ispp_scan.tar.gz
Unpack the archive file with:
tar xzf ispp_scan.tar.gz
Finally create a link for the executable binary with the command:
sudo ln -s /usr/local/ispprotect/ispp_scan /usr/local/bin/ispp_scan
To initiate a scan, issue the command:
ispp_scan
You should see the ISPProtect welcome screen (Figure A).
Figure A
You will then be asked to enter a license (Figure B). Since we’re using this as a trial, type TRIAL and hit enter on your keyboard.
Figure B
The scanner will then ask for the path to scan. You should enter either the web server document root (such as /var/www) or a directory housing data for your sites. Once you’ve done that (Figure C), hit Enter to launch the scan.
Figure C
When the scan completes, it will report back to you if it’s found anything suspicious. Should it find something, you should act on it immediately.
One word of caution. The trial license only gives you one scan, so use it wisely. If, after the trial, you find ISPProtect is a good fit for your needs, purchase a license and scan at will.
There you have it, you’ve scanned your web server for malicious files using a simple, command-line tool. Enjoy.
Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.
You don’t want to miss our tips, tutorials, and commentary on the Linux OS and open source applications.
How to scan your websites for malware with ISPProtect
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Encryption software protects confidential and private data in transit and at rest by making it accessible only to authorized individuals. Learn about the best encryption software and techniques.
Users can access several key Microsoft applications with keyboard shortcuts and a standard keyboard, but increased efficiency is limited without some special tricks.
Jack Wallen takes on the age-old question of what Linux needs to succeed on the desktop. This time around, his answers have nothing to do with software.
Want to enhance and highlight your IT skills? A tech-focused certification might do the trick. These top IT certification prep tools can help.
Ethisphere has released its annual edition of the most ethical companies from a variety of industries.
Recruiting an IoT architect with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions and a basic want ad that you can customize for your business to find, interview, recruit and hire the best candidates for an …
This hiring kit from TechRepublic Premium contains a job description, sample interview questions and a basic want ad to help you find, interview, recruit and hire the best candidates for an open FinTech Engineer position. From the hiring kit’s introduction: Over the past decade or so, particularly after the general proliferation of smartphones at the …
This hiring kit from TechRepublic Premium contains a job description, sample interview questions and a basic want ad to help you find, interview, recruit and hire the best candidates for an open Virtual Reality Designer position. From the hiring kit’s introduction: While the concept of virtual and augmented reality applications has been around for decades, …
It’s critical to plan Microsoft 365 apps and services deployments on Macs properly to avoid end-user frustrations. There are so many elements to consider that forward-thinking IT professionals should consider employing a checklist. With proper administration, IT departments can ensure important tasks aren’t overlooked, and users don’t need to return systems to the help desk …

source