(Self taught noob here!) I found a file in one of the subdomains I manage on my site, titled "the name of the site" containing the sites-available conf for my site! In hindisght, this could just be my folly, I may have forgotten to remove it after temporarily making it accessible to text editor on my other machine. But the scare begged the question for me "is there a way I could have accidentally exposed my conf file?" //lol, no shit, I did *rolls eyes*
I've moved away from a standard ssh port, disabled root and password login. Configured a stringent firewall policy.. but upon installing nginx, I took almost no precautions. What are some exploits to lookout for in the wild, specifically regarding nginx? I've already implemented fail2ban and configured it appropriately for nginx, as far as I believe.. (I stuck with the stock standards) tweaked a few params. I've also locked down the filesystem with tripwire and I have reports that come to me.
Apologies if the question is too broad, its just, I had to ask it somewhere.. securing a site is more than just the tool that interfaces, but i thought there may be exploits that I missed nevertheless!
Thanks in advance :-)!
Edit: sorry, one thing may have turned into two things!