Enter Greyhat
Updated 11.17.02

Recent corporate security breaches and denial
of service attacks have caused large monetary
and reputation damage to renowned online 
businesses and government networks, triggering 
a need for more robust protocols, security 
technology and intrusion detection. 

Currently no security solution on the market 
provides 100% protection from hacking threats. 
Even with firewalls, VPNs, encryption, and 
iDS technologies, hackers are finding ways to 
infiltrate systems. 

The best possible solution is to understand 
risk, minimize exposure,and perform vigilant 
monitoring and updating.

Scanners are important for the security of networks because they are essential 
tools for those who want to attack a system. 

The preparation of an attack by an intruder could look as follows:
- Scan a target machine or selected network
- Observe which services are offered and which operating systems runs these 
  services, and work on some well-known vulnerability in any of them 
- Scan any network or machine, look for a service or operating system (including 
  the checkup of the version) with a known vulnerability.
- Execute expliot code or guess system password, and assume system and/or network control
- Deploy backdoor and clean intruder's tracks
- Access network and/or system at will using backdoor, even if original hole
  is closed by sysadmin.
- Use compromised network as a springboard for further attacks on other networks.
- An intruder may also target a user's E-mail system, physical security, or broadband 
  connection, deposit a trojan horse, worm, or other backdoor and by-pass internal 
  and/or external security controls through a connected corporate VPN, from a 
  compromised internal machine, and/or through a dial-in

Reconnaissance - Network-Tools
Know Your Enemy - Netcraft what's that site running?
Find Operating System - PacketStorm3
Know Your Enemy...OS fingerprint - COTSE
Where are they located? - COTSE

Microsoft's online NT or Win2k security check
Stealth, TCP, ICMP, UDP Scan - Sygate
Swiss Army Knife-Probe, Scan, Identify Blackcode
Port Scan Yourself - SMetrics
Remote Security Tester
Probe Yourself - Compass [also FREE PORT SCAN]
Large scan - HackerWhacker
Port Scan and Probe Yourself - GRC Shields UP
Probe Yourself - DSLReports
Port Scan Yourself - CMHelp
Probe Yourself - NetScreen
Netbios and Passwords Checks - IT-Sec
Vulnerable ActiveX Controls Check
Test Your System
Symantec On-Line Virus & Security Scans
Privacy Analysis of your connection
Check DNS Domain Download
Internet Connection Check - Progressive
*Remote Lotus Domino Server Security Check
Safety Tests (In German) - Compass
Hack Yourself

What is the port that is most attacked currently?
What are the most active virus and scan attempts?
Have you been hacked?
Can you be used for a dDos attack?
Can you be abused by a Spammer?
Are you a smurf amplifier? SAR
Top 10 Internet attackers - DShield
Top 10 Internet attackers - Incidents.org
ISS Global Internet Threat Intelligence Service

Digex Looking Glass - Internet summary, traceroute, BGP, etc.

Switchboard - Find a Person or Business number and address
Peoplefind - Find a Person, Business, trademark, zipcode, etc.

Latest Defaced Web Sites
Trojan Horse information
McAfee Current Virus Map
CIAC Hoax Information Center

Kuang Grade Mark Eleven Penetration Programs

If you would like to add more useful verification links, please send E-mail to info[at]greyhat.com