Recent corporate security breaches and denial of service attacks have caused large monetary and reputation damage to renowned online businesses and government networks, triggering a need for more robust protocols, security technology and intrusion detection. Currently no security solution on the market provides 100% protection from hacking threats. Even with firewalls, VPNs, encryption, and iDS technologies, hackers are finding ways to infiltrate systems. The best possible solution is to understand risk, minimize exposure,and perform vigilant monitoring and updating.
Scanners are important for the security of networks because they are essential tools for those who want to attack a system. The preparation of an attack by an intruder could look as follows: - Scan a target machine or selected network - Observe which services are offered and which operating systems runs these services, and work on some well-known vulnerability in any of them - Scan any network or machine, look for a service or operating system (including the checkup of the version) with a known vulnerability. - Execute expliot code or guess system password, and assume system and/or network control - Deploy backdoor and clean intruder's tracks - Access network and/or system at will using backdoor, even if original hole is closed by sysadmin. - Use compromised network as a springboard for further attacks on other networks. - An intruder may also target a user's E-mail system, physical security, or broadband connection, deposit a trojan horse, worm, or other backdoor and by-pass internal and/or external security controls through a connected corporate VPN, from a compromised internal machine, and/or through a dial-in
Reconnaissance - Network-Tools
Know Your Enemy - Netcraft what's that site running?
Find Operating System - PacketStorm3
Know Your Enemy...OS fingerprint - COTSE
Where are they located? - COTSE
Microsoft's online NT or Win2k security check
Stealth, TCP, ICMP, UDP Scan - Sygate
Swiss Army Knife-Probe, Scan, Identify Blackcode
Port Scan Yourself - SMetrics
Remote Security Tester
Probe Yourself - Compass [also FREE PORT SCAN]
Large scan - HackerWhacker
Port Scan and Probe Yourself - GRC Shields UP
Probe Yourself - DSLReports
Port Scan Yourself - CMHelp
Probe Yourself - NetScreen
Netbios and Passwords Checks - IT-Sec
Vulnerable ActiveX Controls Check
Test Your System
Symantec On-Line Virus & Security Scans
Privacy Analysis of your connection
Check DNS Domain Download
Internet Connection Check - Progressive
*Remote Lotus Domino Server Security Check
Safety Tests (In German) - Compass
What is the port that is most attacked currently?
What are the most active virus and scan attempts?
Have you been hacked?
Can you be used for a dDos attack?
Can you be abused by a Spammer?
Are you a smurf amplifier? SAR
Top 10 Internet attackers - DShield
Top 10 Internet attackers - Incidents.org
ISS Global Internet Threat Intelligence Service
Digex Looking Glass - Internet summary, traceroute, BGP, etc.
Switchboard - Find a Person or Business number and address
Peoplefind - Find a Person, Business, trademark, zipcode, etc.
Latest Defaced Web Sites
Trojan Horse information
McAfee Current Virus Map
CIAC Hoax Information Center
Kuang Grade Mark Eleven Penetration Programs
If you would like to add more useful verification links, please send E-mail to info[at]greyhat.com