[sf-lug] Cool little security check
aaronco36
aaronco36 at SDF.ORG
Sun Sep 2 08:17:33 PDT 2018
maestro <maestro415 at gmail.com> wrote at [01]:
> Next, go to www.grc.com and click on ShieldsUp, next screen scroll down
> to Hot Spots, and click on ShieldsUp again, next screen click on
> Proceed, next screen click on All Service Ports and let it check the
> ports, gives an ok result, the ports are neon green,
The ShieldsUp Wikipedia writeup of [02] describes it as such:
~~~~~~~~~~ quoting ~~~~~~~~~~~~~~
ShieldsUp is an online port scanning service created by Steve Gibson of
Gibson Research Corporation and hosted at grc.com. The purpose of this
utility is to alert the users of any ports that have been opened through
their firewalls or through their NAT routers. The utility can scan the
most common file sharing ports, as well as all service ports (1-1056), and
user defined ports, in sets of 64.
It is often recommended for checking port vulnerabilities.
The scanning servers have the static IP addresses of 4.79.142.192 to
4.79.142.207.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Instead of using this ShieldsUp security check on one's own machine, IMHO,
you might also want to seriously consider getting more up-to-speed with
the Nmap Network exploration tool and security / port scanner. One of its
online manpages is here [03], although if you've already installed Nmap,
you can read its manpage directly from the terminal/commandline. I somehow
gather from the previous posting of reference [04], that you (maestro) are
interested in using Arch-based distros such as Arch/Arch32 itself and
Manjaro Linux. In that case, you could also check out the Arch User
Repository (AUR) description of nmap-svn at [05] and check out the
ArchWiki's description of Nmap at [06].
The Nmap project site is at [07], its overall Documentation site is at
[08], and Chapter 15 of the Nmap Reference Guide [09] has the following
*very* relevant sections:
- Options Summary
- Target Specification
- Host Discovery
- Port Scanning Basics
- Port Scanning Techniques
- Port Specification and Scan Order
- Service and Version Detection
- OS Detection
- Nmap Scripting Engine (NSE)
- Timing and Performance
- Firewall/IDS Evasion and Spoofing
- Output
- Miscellaneous Options
- Runtime Interaction
- Examples
Sure, there *is* a learning-curve for effectively using Nmap to port-scan
one's own machine as compared to using ShieldsUp for the same!
For beginners who would rather start off using a GUI version of Nmap, the
Nmap project also includes and describes 'Zenmap' - "the official Nmap
Security Scanner GUI" [10]. The Nmap project's Zenmap Reference Guide (Man
Page) is at [11] and the less "manpagey" Chapter 12 Zenmap GUI Users'
Guide is at [12].
Resources for using Nmap at the terminal/commandline are *at least* the
Nmap Cheat Sheet [13](this back-references [08]), nixCraft's 'Top 32 Nmap
Command Examples For Linux Sys/Network Admins' [14], and the various
YouTube tutorials for learning+doing "nmap port scanning" [15] (IMNSHO,
YMMV _quite_ _widely_ using these YT videos!)
These are just an admittedly-few references on perhaps using Nmap/Zenmap
instead of ShieldsUp on one's own machine. As always, the additional
feedback, suggestions, and other expert comments on this from Rick M
(e.g., from [16]), Michael P, Akkana P, Jim S, and others reading this are
all very much appreciated and welcome :-)
-A
=============================
References
=============================
[01]http://linuxmafia.com/pipermail/sf-lug/2018q3/013386.html
[02]https://en.wikipedia.org/wiki/ShieldsUp
[03]https://linux.die.net/man/1/nmap
[04]http://linuxmafia.com/pipermail/sf-lug/2018q3/013373.html
[05]https://aur.archlinux.org/packages/nmap-svn/
[06]https://wiki.archlinux.org/index.php/Nmap
[07]https://nmap.org/
[08]https://nmap.org/docs.html
[09]https://nmap.org/book/man.html
[10]https://nmap.org/zenmap/
[11]https://nmap.org/zenmap/man.html
[12]https://nmap.org/book/zenmap.html
[13]https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
[14]https://www.cyberciti.biz/security/nmap-command-examples-tutorials/
[15]https://www.youtube.com/results?search_query=nmap+port+scanning+
[16]http://linuxmafia.com/pipermail/sf-lug/2018q3/013391.html
=============================
aaronco36 at sdf.org
SDF Public Access UNIX System - http://sdf.org
More information about the sf-lug
mailing list