Skip to main content

System Scanning - 12

Once you know how to proactively collect information about your network, you will know how Criminal hackers may launch attacks on your network. Here are some You can do the following to see how vulnerable your system is:

1. Use the data you find in the Whois search to see the correlation between the hostname and IP address Layout. For example, you can verify information about certain internal hostnames, operating protocols, Running services, open ports, and applications are displayed in the web search, which may give you some idea About how criminal hackers quickly penetrate into your system.

2. Scan your internal hosts and understand what malicious users might access. Remember, the attacker May come from within your organization and set up a shop on one of your hosts, which may be very difficult Pointed out.

3. Check the ping utility of the system, or use a third-party utility to ping different addresses at the same time. You can use things like NetScan Tools, fping (if you are using Unix), or Super scan. If you don’t know what your gateway IP address is, you can search your public IP For the address, please visit www.whatismyip.com.

4. Scan your system from outside to inside by scanning open ports. For this, you can use something like Nmap or Superscan, then use something like Wireshark or Omnipeek.


By performing this scan, you can learn what other people can see when scanning your public IP address Then connect the workstation directly to the switch at the public end of the hub or router.

Once you are able to scan for open ports, you will be able to be aware of outsiders who are scanning Your open port can easily find the following information:


  • VPN services you are running, such as IPSec, PPTP, and SSL
  • Services running on your port, such as email, database applications, and web servers
  • Authentication requirements for cross-network sharing
  • Provide remote access services on your systems, such as remote desktop, secure shell, VNC, and Windows terminal services.


Comments

Post a Comment