Blog Posts Tagged with "Network Scanning"

E313765e3bec84b2852c1c758f7244b6

Port 9100/TCP Probes

December 06, 2012 Added by:Brent Huston

Now this is a little interesting. It is likely meant to be a validation probe that the printer device’s embedded web server is online and that the device is operational. BUT, the “Python-urllib/2.7″ made us suspicious. Perhaps this isn’t a usual printer request?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Protection Tax

October 25, 2012 Added by:Tripwire Inc

Unfortunately, you don’t know what you don’t know. You don’t know what your security posture looks like between scans, you don’t what configuration-related exploit or breach indicators you might be missing. In today’s security-is-just-an-illusion environment, getting visibility and knowledge is everything...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Backtrack 5 r3 List of (Some of the) New Tools and Programs

August 27, 2012 Added by:Dan Dieterle

What are the new utilities included with Backtrack 5r3? I couldn’t find a list, so I decided to make one myself comparing BT5r2 with the latest version. This is not an exhaustive list, but hopefully it will help people see some of the very cool new tools and programs added to Backtrack...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Metasploitable 2.0 Tutorial pt 2: Scanning for Network Services

August 14, 2012 Added by:Dan Dieterle

Okay, we put in 192.168.12.20 and it scanned it and returned the version of Samba that was running on it. But what if we wanted to scan the whole network for just systems running Samba. This is where the beauty of the RHOSTS command comes into play. Instead of just scanning the single host, let’s scan all 256 clients...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Metasploitable 2.0 Tutorial: Checking for Open Ports with Nmap

August 03, 2012 Added by:Dan Dieterle

I mentioned recently that we would take a closer look at Metasploitable 2.0, the purposefully vulnerable Linux virtual machine used for learning security tactics and techniques. In this intro, we will quickly cover obtaining Metasploitable 2.0 and scanning it for open ports and services...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Vulnerability Scans too Disruptive to Conduct Regularly

July 12, 2012 Added by:Headlines

“Evidently, active vulnerability scanning can cause huge management headaches due to its disruptive nature and information overload, so scanners tend to be used primarily for ‘spot checks’ that aren’t effective at minimizing risks. Critical vulnerabilities have to be identified, prioritized, and remediated daily..."

Comments  (4)

7d55c20d433dd60022642d3ab77b8efb

Companies Exposing Critical SAP Services to the Internet

June 19, 2012 Added by:Alexander Polyakov

For example, 212 SAP Routers were found in Germany which were created mainly to route access to internal SAP systems. SAP Routers themselves can have security misconfigurations, but the real problem is that 8% of the companies expose SAP Dispatcher services directly to the Internet, circumventing the SAP Router...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Going Back to the Stack

March 15, 2012 Added by:Wendy Nather

If you have parts of your infrastructure outsourced, go over your contracts with your providers. You want them to be able to give you logs within a few minutes of the request and have the right technical support without fighting your way through first-level script-readers...

Comments  (0)

83a1969531a4f021a9f7339e222ab995

NETPeas COREvidence v1.0 Sneak Preview

February 02, 2012 Added by:Nabil Ouchn

COREvidence, a Software as a Service (SaaS) product, integrates multiple services to create a one-stop network security solution. Customers have immediate access to numerous technology leaders in vulnerability management, compliance achievement and monitoring...

Comments  (0)

3750d420f6c2a9844b529978894dc0be

It's Time to Evolve How We Protect Our Data

January 24, 2012 Added by:Josh Shaul

Advanced systems for protecting databases have been available for several years now, and have become mature and reliable technology. Databases can be locked down with secure configurations, strong access controls, and effective patch management strategies...

Comments  (0)

1a490136c27502563c62267354024cd5

That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)


Most Liked