[sf-lug] Cool little security check
maestro
maestro415 at gmail.com
Sun Sep 2 17:47:42 PDT 2018
[Quoting aaron (-A)]
>>maestro <maestro415 at gmail.com> wrote at [01]:
A minor detail but yet important that 'I' didn't write it I was sharing it
[as noted in the o.p.] from a Devuan Admin...
>>Instead of using this ShieldsUp security check on one's own machine,
IMHO,
>>you might also want to seriously consider getting more up-to-speed with
>>the Nmap Network exploration tool and security / port scanner.
Yes Aaron, I am well aware of nmap and it's always one of the first
packages I install on distros if
they don't come with it when I'm installing 'network' packages.
[Note to you Aaron >>> remember the distros I have discussed with you in
the past Kali (migration of Backtrack) and Parrot
which come with a lot of network 'tools' and pen-testing options? They are
still around too.]
Thank you Aaron for your taking the time to list those resources ^^^
hopefully others will use them as well. I will have fun
perusing them...
John, whom I'm not sure if he is on this SF-LUG mailist and is newer to the
meet-ups, is running what he self-titles a 'security-oriented-box' with
mulitple distros running in vm's and one he is using is Qubes <
https://www.qubes-os.org/intro/> && <https://en.wikipedia.org/wiki/Qubes_OS
>
which I had a discussion with him about since I had read some documentation
on it and was looking into it quite a while ago...
Thank you Aaron for your IMHO/IMNSHO contributions as well ;-))>
[Sidenote]
When I finally get the box with secure server software on it up and having
a home powered up 24/7-365 I definitely want to offer you a SSH login et
al..
And of course invite you to attack it >]> all you like...
Enjoy your weekend...
'maestro'
message ends.
__________________
On Sun, Sep 2, 2018 at 8:20 AM aaronco36 <aaronco36 at sdf.org> wrote:
>
> maestro <maestro415 at gmail.com> wrote at [01]:
>
> > Next, go to www.grc.com and click on ShieldsUp, next screen scroll down
> > to Hot Spots, and click on ShieldsUp again, next screen click on
> > Proceed, next screen click on All Service Ports and let it check the
> > ports, gives an ok result, the ports are neon green,
>
> The ShieldsUp Wikipedia writeup of [02] describes it as such:
> ~~~~~~~~~~ quoting ~~~~~~~~~~~~~~
> ShieldsUp is an online port scanning service created by Steve Gibson of
> Gibson Research Corporation and hosted at grc.com. The purpose of this
> utility is to alert the users of any ports that have been opened through
> their firewalls or through their NAT routers. The utility can scan the
> most common file sharing ports, as well as all service ports (1-1056), and
> user defined ports, in sets of 64.
> It is often recommended for checking port vulnerabilities.
>
> The scanning servers have the static IP addresses of 4.79.142.192 to
> 4.79.142.207.
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> Instead of using this ShieldsUp security check on one's own machine, IMHO,
> you might also want to seriously consider getting more up-to-speed with
> the Nmap Network exploration tool and security / port scanner. One of its
> online manpages is here [03], although if you've already installed Nmap,
> you can read its manpage directly from the terminal/commandline. I somehow
> gather from the previous posting of reference [04], that you (maestro) are
> interested in using Arch-based distros such as Arch/Arch32 itself and
> Manjaro Linux. In that case, you could also check out the Arch User
> Repository (AUR) description of nmap-svn at [05] and check out the
> ArchWiki's description of Nmap at [06].
>
> The Nmap project site is at [07], its overall Documentation site is at
> [08], and Chapter 15 of the Nmap Reference Guide [09] has the following
> *very* relevant sections:
> - Options Summary
> - Target Specification
> - Host Discovery
> - Port Scanning Basics
> - Port Scanning Techniques
> - Port Specification and Scan Order
> - Service and Version Detection
> - OS Detection
> - Nmap Scripting Engine (NSE)
> - Timing and Performance
> - Firewall/IDS Evasion and Spoofing
> - Output
> - Miscellaneous Options
> - Runtime Interaction
> - Examples
>
> Sure, there *is* a learning-curve for effectively using Nmap to port-scan
> one's own machine as compared to using ShieldsUp for the same!
>
> For beginners who would rather start off using a GUI version of Nmap, the
> Nmap project also includes and describes 'Zenmap' - "the official Nmap
> Security Scanner GUI" [10]. The Nmap project's Zenmap Reference Guide (Man
> Page) is at [11] and the less "manpagey" Chapter 12 Zenmap GUI Users'
> Guide is at [12].
>
> Resources for using Nmap at the terminal/commandline are *at least* the
> Nmap Cheat Sheet [13](this back-references [08]), nixCraft's 'Top 32 Nmap
> Command Examples For Linux Sys/Network Admins' [14], and the various
> YouTube tutorials for learning+doing "nmap port scanning" [15] (IMNSHO,
> YMMV _quite_ _widely_ using these YT videos!)
>
> These are just an admittedly-few references on perhaps using Nmap/Zenmap
> instead of ShieldsUp on one's own machine. As always, the additional
> feedback, suggestions, and other expert comments on this from Rick M
> (e.g., from [16]), Michael P, Akkana P, Jim S, and others reading this are
> all very much appreciated and welcome :-)
>
> -A
>
> =============================
> References
> =============================
> [01]http://linuxmafia.com/pipermail/sf-lug/2018q3/013386.html
> [02]https://en.wikipedia.org/wiki/ShieldsUp
> [03]https://linux.die.net/man/1/nmap
> [04]http://linuxmafia.com/pipermail/sf-lug/2018q3/013373.html
> [05]https://aur.archlinux.org/packages/nmap-svn/
> [06]https://wiki.archlinux.org/index.php/Nmap
> [07]https://nmap.org/
> [08]https://nmap.org/docs.html
> [09]https://nmap.org/book/man.html
> [10]https://nmap.org/zenmap/
> [11]https://nmap.org/zenmap/man.html
> [12]https://nmap.org/book/zenmap.html
> [13]https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
> [14]https://www.cyberciti.biz/security/nmap-command-examples-tutorials/
> [15]https://www.youtube.com/results?search_query=nmap+port+scanning+
> [16]http://linuxmafia.com/pipermail/sf-lug/2018q3/013391.html
> =============================
>
>
> aaronco36 at sdf.org
> SDF Public Access UNIX System - http://sdf.org
>
> _______________________________________________
> sf-lug mailing list
> sf-lug at linuxmafia.com
> http://linuxmafia.com/mailman/listinfo/sf-lug
> Information about SF-LUG is at http://www.sf-lug.org/<br>
> Related Information <br>
> http://www.shallowsky.com/blog/<br>
> http://explainshell.com/ <br>
>
--
*~the quieter you become, the more you are able to hear...*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://linuxmafia.com/pipermail/sf-lug/attachments/20180902/cc09af3b/attachment-0001.html>
More information about the sf-lug
mailing list