Malicious port scans and sweeps
After installation, BitNinja opens 100 randomly chosen unused or closed ports while taking into account the existing services you are running to avoid any interruptions. These ports act like honeypots, exposing malicious IPs, before they can attack your server. Some of these honeypots will even behave like real services, for instance, the commonly attacked telnet.
As most attacks begin with scanning for possible vulnerabilities, Port Honeypot instantly blocks future attacks: any malicious IPs will be automatically greylisted so they can’t infect your server.
CMS (Wordpress, Joomla, Drupal, etc) vulnerabilities
Web Honeypot works like Port Honeypot, with one important exception – you can replace any compromised file with honeypot scripts. You get the same benefits, plus additional customization to trap hackers and prevent further attacks. You can also configure BitNinja’s Malware Detection and Removal to automate this process for trouble-free protection against threats to web and CMS applications on your server.
Unvalidated file uploads, script injection, remote code injection, and CMS (Wordpress, Joomla, Drupal, etc) vulnerabilities
Application layer attacks, such as directory traversal, SQL Injection, XSS, remote file inclusion, code injection, on-site and cross-site request forgery, buffer overflow, unvalidated file upload, and CMS (Wordpress, Joomla, Drupal, etc) vulnerabilities
Our Web Application Firewall (WAF) constantly scans and analyzes the incoming traffic flow to your server, looking for malicious content based on different factors. Used in conjunction with Log Analysis, WAF guarantees an extremely low false positive rate while stopping attacks against the applications running on your server:
Application layer attacks, like directory traversal, SQL Injection, XSS, remote file inclusion, code injection, on-site and cross-site request forgery, and CMS (Wordpress, Joomla, Drupal, etc) vulnerabilities
BitNinja constantly monitors your server logs including Apache, NginX, Auth log, MySQL, Exim, Cpanel and others. As soon as it detects any suspicious behavior, it blocks further malicious actions.
Automated botnet attacks
CAPTCHA is the abbreviation for Completely Automated Public Turing Test to Tell Computers and Humans Apart. BitNinja uses CAPTCHA to distinguish between human and bot-generated traffic, streamlining the handling of false positives. As a result:
BitNinja provides validation on different protocols, such as HTTP, HTTPS and SMTP. In the case of HTTP or HTTPS, web visitors are redirected to a CAPTCHA page. For SMTP, an email is sent with a confirmation link. Human visitors can remove themselves from the greylist with ease, while bots will remain blocked.
Recurring automatic exploits and zero-day attacks
Servers protected by BitNinja collect and share attack information with each other. Together, they form a global defense network, which becomes more intelligent and more powerful with every single attack.
This means when any BitNinja protected server detects an attack, your server is immediately vaccinated against the malicious IP at the source of the attack.
With our all-in-one security suite and global defense network, BitNinja also discovers and eliminates zero-day attacks and automated exploits – before they occur.
Collective Intelligence creates a set of manageable IP lists. These sets grant security on three different levels:
In addition to our user-based blacklist, BitNinja maintains a global blacklist which is shared among all BitNinja protected servers. Servers protected by BitNinja drop packets from IPs on this list. To make sure these IPs are blocked for a legitimate reason, we constantly evaluate the list by moving blacklisted IPs to our greylist at predefined intervals to detect whether the traffic from the IP source is still malicious.
Denial of Service via TCP based protocols – HTTP, SMTP, FTP etc.
BitNinja constantly monitors the number of simultaneous incoming and outgoing connections and blocks DoS (Denial of Service) attacks with our unique approach:
TCP/UDP-based Distributed Denial of Service attack
All servers running BitNinja create a global defense network, sharing information about malicious IPs. With data on over 15 million IPs worldwide, plus honeypots to capture and analyze the latest threats, your server is protected against DDoS botnet attacks – before they happen.
Application-level DoS attack directed at the BitNinja application
A chain is only as strong as its weakest link. Antiflood ensures that hackers cannot mount an attack against the BitNinja application and destroy your defense shield in the process. Antiflood works by aggregating information from the entire BitNinja security suite to prevent any individual module from overloading.
Stop spam and overcharges – take back control of your server and make sure it isn’t part of a botnet.
Exit the jungle of complicated server security and enter the world of simplicity with all-in-one protection.
Work with a passionate team who cares and make an ally in the war against hackers.
Avoid damage to your reputation and business losses from leaked private data, stolen passwords and credit card numbers.
Automate your server security and eliminate frustration for your team and customers.
Put your attention back on your business and don’t let hackers distract you from your core focus.