Haze

testing your computers security

11 posts in this topic

I would like to test how well my computer is secured. What tools could I use to test it? I already used a small port scanner, and nortan anti blocked it, what are some other examples?

0

Share this post


Link to post
Share on other sites

I would like to test how well my computer is secured. What tools could I use to test it? I already used a small port scanner, and nortan anti blocked it, what are some other examples?

post something like this on this forum

hack me 70.122.124.58

and when and if something starts going wrong with your computer, you know you don't have good security. and yes that is my ip and someone try to hack me, just for fun. :)

here is the nmap scan


nmap -sS -sV -O -P0 70.122.124.58

Starting Nmap 4.03 ( http://www.insecure.org/nmap/ ) at 2006-10-09 17:38 CDT
Interesting ports on cpe-70-122-124-58.houston.res.rr.com (70.122.124.58):
(The 1669 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.0.4
22/tcp open ssh OpenSSH 4.2p1 Debian-7ubuntu3 (protocol 2.0)
53/tcp open tcpwrapped
80/tcp open http Apache httpd 2.0.55 ((Ubuntu))
8080/tcp open http Linksys wireless-G router http config (Name router)
Device type: general purpose
Running: Linux 2.4.X|2.5.X|2.6.X
OS details: Linux 2.4.0 - 2.5.20, Linux 2.4.7 - 2.6.11
Service Info: OS: Unix; Device: router

Nmap finished: 1 IP address (1 host up) scanned in 9.290 seconds

0

Share this post


Link to post
Share on other sites

I would like to test how well my computer is secured. What tools could I use to test it? I already used a small port scanner, and nortan anti blocked it, what are some other examples?

post something like this on this forum

hack me 70.122.124.58

and when and if something starts going wrong with your computer, you know you don't have good security. and yes that is my ip and someone try to hack me, just for fun. :)

here is the nmap scan


nmap -sS -sV -O -P0 70.122.124.58

Starting Nmap 4.03 ( http://www.insecure.org/nmap/ ) at 2006-10-09 17:38 CDT
Interesting ports on cpe-70-122-124-58.houston.res.rr.com (70.122.124.58):
(The 1669 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.0.4
22/tcp open ssh OpenSSH 4.2p1 Debian-7ubuntu3 (protocol 2.0)
53/tcp open tcpwrapped
80/tcp open http Apache httpd 2.0.55 ((Ubuntu))
8080/tcp open http Linksys wireless-G router http config (Name router)
Device type: general purpose
Running: Linux 2.4.X|2.5.X|2.6.X
OS details: Linux 2.4.0 - 2.5.20, Linux 2.4.7 - 2.6.11
Service Info: OS: Unix; Device: router

Nmap finished: 1 IP address (1 host up) scanned in 9.290 seconds

Lol, i can't even get a ping on you ^_^

0

Share this post


Link to post
Share on other sites

Lol, i can't even get a ping on you ^_^

Because I don't let people ping me. If you do want to see if there is something living on that IP without scanning it you could always go to my crappy webserver.

Edited by arewhyainn
0

Share this post


Link to post
Share on other sites
# Nmap 4.10 scan initiated Mon Oct  9 23:33:39 2006 as: nmap -sS -vvv -P0 -O -oN arewhyain 70.122.124.58 
Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port
Interesting ports on cpe-70-122-124-58.houston.res.rr.com (70.122.124.58):
Not shown: 1675 filtered ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
8080/tcp open http-proxy
Device type: broadband router|media device|firewall|general purpose
Running (JUST GUESSING) : Panasonic embedded (93%), Pace embedded (92%), WatchGuard embedded (92%), Level One embedded (92%), Linux 2.4.X|2.6.X (91%)
Aggressive OS guesses: Panasonic IP Technology Broadband Networking Gateway, KX-HGW200 (93%), Pace digital cable TV receiver (92%), WatchGuard Firebox X700 (92%), LevelOne WBR-3403TX Wireless Broadband router (92%), Linux 2.4.18 - 2.4.27 (91%), Linux 2.4.19 (91%), Linux 2.4.21 (Suse, X86) (91%), Linux 2.4.22 (91%), Linux 2.6.10 (91%), Linux 2.6.5 - 2.6.11 (91%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SInfo(V=4.10%P=i686-pc-linux-gnu%D=10/9%Tm=452B1650%O=21%C=-1)
TSeq(Class=RI%gcd=1%SI=43B0DA%IPID=Z)
TSeq(Class=RI%gcd=1%SI=43AE2B%IPID=Z)
TSeq(Class=RI%gcd=1%SI=4227D5%IPID=Z)
T1(Resp=Y%DF=N%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=N)
T4(Resp=N)
T5(Resp=N)
T6(Resp=N)
T7(Resp=N)
PU(Resp=N)

TCP Sequence Prediction: Class=random positive increments
Difficulty=4335573 (Good luck!)
IPID Sequence Generation: All zeros

# Nmap run completed at Mon Oct 9 23:41:04 2006 -- 1 IP address (1 host up) scanned in 445.741 seconds

0

Share this post


Link to post
Share on other sites

# Nmap 4.10 scan initiated Mon Oct  9 23:33:39 2006 as: nmap -sS -vvv -P0 -O -oN arewhyain 70.122.124.58 
Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port
Interesting ports on cpe-70-122-124-58.houston.res.rr.com (70.122.124.58):
Not shown: 1675 filtered ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
8080/tcp open http-proxy
Device type: broadband router|media device|firewall|general purpose
Running (JUST GUESSING) : Panasonic embedded (93%), Pace embedded (92%), WatchGuard embedded (92%), Level One embedded (92%), Linux 2.4.X|2.6.X (91%)
Aggressive OS guesses: Panasonic IP Technology Broadband Networking Gateway, KX-HGW200 (93%), Pace digital cable TV receiver (92%), WatchGuard Firebox X700 (92%), LevelOne WBR-3403TX Wireless Broadband router (92%), Linux 2.4.18 - 2.4.27 (91%), Linux 2.4.19 (91%), Linux 2.4.21 (Suse, X86) (91%), Linux 2.4.22 (91%), Linux 2.6.10 (91%), Linux 2.6.5 - 2.6.11 (91%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SInfo(V=4.10%P=i686-pc-linux-gnu%D=10/9%Tm=452B1650%O=21%C=-1)
TSeq(Class=RI%gcd=1%SI=43B0DA%IPID=Z)
TSeq(Class=RI%gcd=1%SI=43AE2B%IPID=Z)
TSeq(Class=RI%gcd=1%SI=4227D5%IPID=Z)
T1(Resp=Y%DF=N%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=N)
T4(Resp=N)
T5(Resp=N)
T6(Resp=N)
T7(Resp=N)
PU(Resp=N)

TCP Sequence Prediction: Class=random positive increments
Difficulty=4335573 (Good luck!)
IPID Sequence Generation: All zeros

# Nmap run completed at Mon Oct 9 23:41:04 2006 -- 1 IP address (1 host up) scanned in 445.741 seconds

very nice :)

0

Share this post


Link to post
Share on other sites
Apache/2.0.55 (Ubuntu) Server at 70.122.124.58 Port 80 

0

Share this post


Link to post
Share on other sites

u have lots of open ports

WTF? I have 3 open. that is not alot? (i closed port 8080, I never use it)

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now