Scope of the security test
We want to launch our brand new section, “Cyber security hacks” with some tricks and tools to find out whether the devices in your network are vulnerable to be hacked.
This test can be performed on any devices that are in the same network as the PC that is going to run it; therefore, they all have to be in the same network. For this example, we will show you the test over a PC and a Raspberry Pi.
The PC which run test is Windows one, but the different tools shown for this purpose can be installed and run in Ubuntu systems too.
Option 1: Finding vulnerabilities in open ports
If a PC has certain ports open, it can be vulnerable to be accessed remotely by an untrusted user or malware. The number one tool to find this out is nmap.
The following images show the basic port scanning in a PC and a Raspberry Pi, respectively.
In these systems, these ports are normally open and doesn’t necessarily imply a security risk.
If you want to get more information about the remote device such as the operative system, the active services, run the command:
nmap -v -sV
Option 2: Scanning ports and searching for vulnerabilities
This is another free option that you can use to scan open ports but also to find vulnerabilities in the remote system…cool right? 😉
The installation has some more steps, so we will guide you through the process:
Step 1: Go to the registration website to get a free activation code:
Step 2: Check the code in your inbox:
Step 3: In your browser, go to https://localhost:8834
Then, just follow the instructions that are shown in the screens till you get to the installation screen, which will take about 30 – 40 minutes:
Once the process is completed, you are all set up to start scanning remote hosts!
The first thing to do to run a simple, but very effective scan is to select a type of scan. You can also create a Policy, which is a type of scan already set up, so when you create a scan you already have your “template” ready, but we’ll do it this way for now:
We select the “Basic Network Scan”, and then we configure it:
You can set up the rest of the options, such as the level of details that you want to see in the report.
Once you’ve done this, you can run the scan and wait for a bit or while. This will depend on the number of IPs to scan and the type of scan.
Then the results are available, and you can see them by host and their level of risk (info, low, medium, high, critical) :
In this case, the level “Info” means there are no vulnerabilities to exploit. 🙁
Well, that’s ok for our PC and Raspberry, though!
There will be vulnerabilities when the level is critical; then, you can search for the vulnerability and available exploits, but we’ll leave this for future posts 😉
Anyway, we can see the detail of these results too:
As you can see, checking your network devices security is really easy and it’s free!
You can find unknown info about the devices. If there is some security issue you can solve it or exploit it 😉
If you like this topic and would like to know more about it, let us know in the comments below. Also, if you are an expert and want to add something to our tutorial, you are welcome to comment or even to complete this post with a guest publication 😀
Start losing weight today. Choose Qsymia. viagra malaysia Just one Qsymia pill — and you will be spared for the day of: constant feeling of hunger; frequent desire to eat something; increased appetite and overeating.
TeoBoips 16 July , 9 h 50 min accutane online. viagra online AmyBoips 16 July , 12 h 06 min buy cipro.