The US elections of 2016, were full of surprise and twist, the main being the outcome. But no one saw this coming, when CIA said that Kremlin-directed a cyber campaign to influence the US election, the world was more than shocked, so today we look at what exactly a Cyber Attack Means?
In to
Your computer systems and applications require one of the most fundamental communications systems in your organization — your network. Although many organizations don’t completely rely on wireless networks for everything, others do. Either way, your wireless network likely depends on critical servers; you can’t afford to have them compromised via the network. These computers, even if they’re an ancillary part of your overall network, are there for business reasons; damage them, damage the business. Therefore it’s important to understand just what can happen when network-based 802.11 vulnerabilities are exploited.
There are thousands of possible network-level vulnerabilities on your wireless systems — and seemingly just as many tools and testing techniques. The key point to remember here is that you don’t need to test your wireless network for every possible vulnerability, using every tool available and technique imaginable. Instead, look for vulnerabilities that can have a swift and immediate impact on your systems.
I am listing a number of ways you can try and remain safe online.
TOOLS:
The following are some of the popular tools available for scanning:
Nmap
Nmap is a popular open-source tool for network discovery and security auditing that works on different platforms like Linux, Windows and Mac. It basically comes in the form of a command line interface; however, to facilitate the ease of use it is also available in a GUI format called Zenmap. For Windows machines, you can install the “self-installer” version of Nmap that comes in the “.exe” format. The download link for the same in available below: Nmap Download: http://nmap.org/download.html
The “Target” box needs to be filled with the target IP address or domain name on which you want to perform the scan. It also comes pre loaded with 10 different scan profiles that you can select from.
Intense Scan
This scan type should be reasonably quick as it only scans TCP ports. Additionally, it makes an attempt to detect the OS type, various services and their version numbers that are running on the target machine.
Intense Scan Plus UDP It is the same Intense scan as described above but also includes scanning of UDP ports.
Intense Scan, all TCP Ports Unlike the normal Intense scan which only scans a list of 1000 most common ports, the “Intense scan, all TCP ports” scans all available 65535 ports.
Intense Scan, No Ping This option will exclude pinging the target from the Intense scan. You may use this option when you already know that the target is up or is blocking ping requests.
Ping Scan
This option will only ping the target but does not perform port scanning of any type.
Quick Scan
Scans faster than the Intense scan by limiting the number of TCP ports scanned to only the top 100 most common TCP ports.
Quick Scan Plus Quick scan plus adds OS detection and a bit of version detection features to Quick scan.
Quick Traceroute This option will show you the route that the packets take to reach the target starting with the localhost (source or your own computer).
Regular Scan
This will perform the ping and TCP port scan of 1000 default ports on the target.
Slow Comprehensive Scan
This scan will try all possible options to uncover as much information as it can about the target. It uses three different protocols: TCP, UDP and SCTP in order to detect hosts. Out of all the 10 scanning options, I reckon Intense Scan to be appropriate under most conditions. Just fill the “Target” box, select the “Intense scan” profile and hit the “Scan” button. Let us now analyze the Nmap result output by running it on a sample target. After the scan is completed the “Nmap Output” tab displays the raw output of all the scan operations such as the date and time it was performed, the results from ping scan, discovered open ports, target OS and traceroute.
The other tabs split the same results into an organized manner so as to display them in a more user friendly manner using GUI interface. The “Ports/Hosts” tab will display a list of discovered ports, their status as to whether they are closed or open, the protocol associated and the services running on them.
You can use the “Automated Tools” to quickly perform port scan and grab vital information about the target such as DNS records, Whois data, Traceroute details all from a single place. On the other hand the “Manual Tools” section contains individual tools specially crafted to give more control in the scanning process for advanced users.
Online Tools
You can also make use of online tools to perform port scan and discover important information about the target. The following are some of the links useful online network tools that are worth considering:
PenTest-Tools
YouGetSignal
0 Comments