Solved

How to scan external IP for vulnerabilities?

Posted on 2010-08-28
5
965 Views
Last Modified: 2012-08-14
How can I scan my companies external facing IP for vulnerabilities, such as malicious attacks, attempts at gaining access to our network, and any other bad things like that? I know about the QualysGuard service but I'm on a tight budget. Thanks.
0
Comment
Question by:canalicomputers
5 Comments
 
LVL 6

Accepted Solution

by:
radnbne earned 500 total points
ID: 33550669
You could start with Shields up.  An internet based test of your external fingerprint.

https://www.grc.com/x/ne.dll?bh0bkyd2

0
 
LVL 7

Expert Comment

by:mcuk_storm
ID: 33550672
if you have a machine on another internet connection you could run nessus ( http://www.nessus.org/nessus/ ) on it to scan you network
0
 
LVL 7

Expert Comment

by:mcuk_storm
ID: 33550687
An alternative to nessus (as they now seem to be pushing their buy a commercial license) is http://www.openvas.org/index.html
0
 
LVL 10

Expert Comment

by:yasserd
ID: 33554592
"for vulnerabilities"
You may subscribe to any pay-per-scan service (which doesn't require buying any hardware) like Qualys, eEye Retina, Mcafee..etc
Or you may do it yourself using either commercial tools like Nessus and the above mentioned ones or free ones like openvas (which is based originally on Nessus).

"malicious attacks, attempts at gaining access to our network"
These types of things can be detected by enabling logging of your firewall and/or having an IPS. You can then analyze these logs to look for suspicious activities.
0
 

Author Closing Comment

by:canalicomputers
ID: 33671235
Thanks
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question