Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for other reasons.

Want to protect your network and the computers in your network?  You can get updates for your operating systems (Linux, Mac, iOS, Android, Windows or whatever) along with updates for third party programs yet you can still be unsecure.    When updating these products, you also have to remember firmware and updates for wireless devices, access points, bridges, firewalls, routers, switches, SCADA devices, robots, mobile devices, printers and any device on your network.

Metasploit

http://www.metasploit.com/download/

Metasploit Community is free and allows for a free scan of your network or server. Although limited (Try Pro for details and Brute Force), Metasploit Community is a first step in finding open services and ports on your operating system, hardware devices such as routers and other devices.   The trick to installing Metasploit is to disable your antivirus or make exceptions to what your antivirus finds.   You should truly install the software inside of a VM (Virtual Machine) so that your computer remains protected.

You can use Metasploit to protect your network by ‘seeing’ what a hacker or malicious person would see.  Truly for network professionals and auditors, this software can help you identify services, ports and weaknesses in your network.

There are several versions of Metasploit – Community, Pro, Express and Framework (Compare Editions)

Metasploit     Metasploit Two

Metasploit Scan Complete     metasploit Hosts

Metasploit Services After Scan

The above scan was in a controlled lab.  Malicious scanning of networks may be illegal.  Read  Penetration Basics on Metasploit’s website.

Tutorials (Videos)

Your business and home needs a firewall…why?

So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs?

craziness

 

You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones and other devices on your network.   You’ll also notice common port numbers in the above log.  So what would happen if any of the services and ports were open?  It could result in the loss of data.

What should you do?  Install a hardware SOHO firewall and keep your OS firewall on.  While there are tons of other precautions you also need to take, ultimately this is a form of protection most home users and business users fail to implement.

Credit: Chris Davis

300,000-plus wireless routers have malicious changes

ARSTechnica outlines how hackers have made malicious changes to routers….again.

Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made by D-Link, Micronet, Tenda, TP-Link, and others.

800M exposed records make 2013 record year for data breaches

While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million.

800M exposed records make 2013 record year for data breaches.

Adobe Account leaked credentials checker

adobe passwords

Check to see if your Adobe email was leaked during a recent breach.  Change passwords on any account including on Adobe.  Never use the same password for different websites.

http://adobe.cynic.al/

Interactive Digital Attack Map

Digital Attack Map is  an excellent interactive attack map that allows for the viewing of DDoS attacks and more.

This offers an animated view of DDoS attacks and has a gallery including news links on some of the largest attacks.

Thanks Kevin for sharing!

 

DigiAttackMap

Microsoft releases the Enhanced Mitigation Experience Toolkit Version 4.0

The Enhanced Mitigation Experience Toolkit which is also known as EMET is designed to assist IT Pros with securing their systems.  EMET helps to block hackers from accessing systems.   EMET helps to block common attacks and enables IT personnel to manage security.

An excellent review of EMET.

Microsoft Download and Blog on EMET

 

Experts hope for another failure in next Anonymous attack

Anonymous’ failed attack against Israeli websites last month has left security experts cautiously optimistic that the hacktivist group will be unsuccessful in its plans to disrupt U.S. government and banking sites.

Anonymous plans to launch distributed denial of service (DDoS) attacks on May 7 against nine government sites and more than 130 financial institutions….”

Experts hope for another failure in next Anonymous attack.

Networkworld (ShareThis)

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for vulnerabilities that may affect your device.

 

CNN’s Money on “Hacking anything connected to the internet

 

 

How long will it take to crack your password?

Mickey found a great site that gives the approximate time it will take to break your password.  The site, howsecureismypassword.net gives the  approximate time and a background color that indicates how secure your password is.  There are other things to worry about.  One of the things people don’t realize is that the code in your website may reveal even the most complex passwords.  It is up to the webmaster of your site to keep you secure.

Secure

Unsecure

2013 Cyber Threats

2013 Predictions – Cyber Threats

Steve

  • As BYOD takes off in the workplace and in education, the use of social media along with emails on BYOD devices will cause infections and loss of data
  • IDS/IPS systems along with firewalls that are not implemented in medical facilities and doctors’  offices will cause data loss as records are moved online- The medical industry needs quality audits at all levels.
  • DDoS attacks will increase (at this time, around 65% of companies experience this annually)
  • Cyber attacks will increase  against the U.S.
  • Advanced SQL injections will lead to more data theft
  • Use of social networking and personal surfing habits at work will continue to lead to corporate data loss
  • Cheap Android tablets that don’t offer updates (security) are being sold at a record breaking rate this Christmas - this becomes the weakest link on home and business networks creating a vehicle for data loss 
  • Application Markets will try to stop malicious apps from being uploaded but the overwhelming demand of consumerization and application development outpace quality control on the source market.  This will continue to allow malicious software to be uploaded.
  • Outdated insecure applications will continue to be a problem
  • Botnets will infect smartTVs and other home based devices on your network
  • Counterfeited components manufacturing will increase
  • Infected firmware will increase on devices (backdoors) i.e. printers, hard drives, picture frames, wi-fi devices
  • Cloud computing and storage will be hacked
  • Incorrect sharing of documents on cloud servers will become a problem
  • Data loss will be recorded on personal devices that contain corporate documents
  • MAC OS will become a more attractive target
  • SCADA will become a large target

Have a  prediction? Let us know. We’ll post it.

Manufacturers should have a quality team to insure that devices are up-to-date and business and home owners need policies (rules) on internet usage.  Consumers need to be educated on products and safe internet usage.