Release note on BitNinja 1.9.2

Happy Holidays everyone! Most of us are tuned for Christmas time already, but ninjas don’t know free days, as hackers are just getting in their element in the busiest days of the year.

So we haven’t wated our time in the last few weeks, but developed some new features and useful things for you. Grab the latest version of BitNinja (1.9.2) and enjoy the hacker-free holidays!

Brand new documentation site

First of all, an old deficiency was eliminated lately. We released our new documentation site which contains more information about the mechanism behind BitNinja. IP reputation methods, modules and CLI are also presented there. Please feel free to comment on it. Every feedback is appreciated. We want it to be the best source for IT pros to get basic informations about BitNinja’s role in server security.

ISPmanager plugin

Ninjas are so happy to have more and more plugins for different platforms, so we can make the usage of BitNinja easier for you.

Our latest cooperation with ISPsystem ended up in a very comfortable and useful plugin. You can follow these steps to easily install BitNinja to ISPmanager:

wget -qO- http://bitninja.io/ispmgr-plugin.tar.gz | tar -zx && ./ispmgr-plugin/install --license_key=THE_LICENSE_KEY

Or without license key:

wget -qO- http://bitninja.io/ispmgr-plugin.tar.gz | tar -zx && ./ispmgr-plugin/install

Important bugfixes

We also released some important bugfixes with the latest versions.

First of all, thank you to all for testing the beta WAF module with us. You help a lot in improving and developing one of our most awaited features. After the first weeks of testing, it handles systems with multiple IPs without any fail and also new rules were built in the firewall.

If you haven’t tested out yet, feel free to enable it anytime.

Next steps

In the upcoming weeks, we are planning to release our SMTP captcha module that will help preventing spam attempts and catch the attackers before reaching their goals. It is being tested now and we see very-very promising results so far.

We are also working on a proxy filter feature for the WAF. It will make the greylisting method more effective when somebody tries to use known proxy servers to hide its identity.

And the third upcoming thing is the Port mine (honeypot) module which will make the users able to set up honeypots for optional ports and catch port scanning attempts.