Software: nginx/1.23.4. PHP/5.6.40-65+ubuntu20.04.1+deb.sury.org+1 uname -a: Linux foro-restaurado-2 5.15.0-1040-oracle #46-Ubuntu SMP Fri Jul 14 21:47:21 UTC 2023 uid=33(www-data) gid=33(www-data) groups=33(www-data) Safe-mode: OFF (not secure) /etc/fail2ban/action.d/ drwxr-xr-x |
Viewing file: Select action/file-type: # Fail2ban Citrix Netscaler Action # by Juliano Jeziorny # [email protected] # # The script will add offender IPs to a dataset on netscaler, the dataset can then be used to block the IPs at a cs/vserver or global level # This dataset is then used to block IPs using responder policies on the netscaler. # # The script assumes using HTTPS with unsecure certificate to access the netscaler, # if you have a valid certificate installed remove the -k from the curl lines, or if you want http change it accordingly (and remove the -k) # # This action depends on curl # # You need to populate the 3 options inside Init # # ns_host: IP or hostname of netslcaer appliance # ns_auth: username:password, suggest base64 encoded for a little added security (echo -n "username:password" | base64) # ns_dataset: Name of the netscaler dataset holding the IPs to be blocked. # # For further details on how to use it please check http://blog.ckzone.eu/2017/01/fail2ban-action-for-citrix-netscaler.html [Init] ns_host = ns_auth = ns_dataset = [Definition] actionstart = curl -kH 'Authorization: Basic <ns_auth>' https://<ns_host>/nitro/v1/config actioncheck = actionban = curl -k -H 'Authorization: Basic <ns_auth>' -X PUT -d '{"policydataset_value_binding":{"name":"<ns_dataset>","value":"<ip>"}}' https://<ns_host>/nitro/v1/config/ actionunban = curl -H 'Authorization: Basic <ns_auth>' -X DELETE -k "https://<ns_host>/nitro/v1/config/policydataset_value_binding/<ns_dataset>?args=value:<ip>" |
:: Command execute :: | |
--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by HackingTool | HackingTool | Generation time: 0.0102 ]-- |