Solved

How to scan external IP for vulnerabilities?

Posted on 2010-08-28
5
956 Views
Last Modified: 2012-08-14
How can I scan my companies external facing IP for vulnerabilities, such as malicious attacks, attempts at gaining access to our network, and any other bad things like that? I know about the QualysGuard service but I'm on a tight budget. Thanks.
0
Comment
Question by:canalicomputers
5 Comments
 
LVL 6

Accepted Solution

by:
radnbne earned 500 total points
ID: 33550669
You could start with Shields up.  An internet based test of your external fingerprint.

https://www.grc.com/x/ne.dll?bh0bkyd2

0
 
LVL 7

Expert Comment

by:mcuk_storm
ID: 33550672
if you have a machine on another internet connection you could run nessus ( http://www.nessus.org/nessus/ ) on it to scan you network
0
 
LVL 7

Expert Comment

by:mcuk_storm
ID: 33550687
An alternative to nessus (as they now seem to be pushing their buy a commercial license) is http://www.openvas.org/index.html
0
 
LVL 10

Expert Comment

by:yasserd
ID: 33554592
"for vulnerabilities"
You may subscribe to any pay-per-scan service (which doesn't require buying any hardware) like Qualys, eEye Retina, Mcafee..etc
Or you may do it yourself using either commercial tools like Nessus and the above mentioned ones or free ones like openvas (which is based originally on Nessus).

"malicious attacks, attempts at gaining access to our network"
These types of things can be detected by enabling logging of your firewall and/or having an IPS. You can then analyze these logs to look for suspicious activities.
0
 

Author Closing Comment

by:canalicomputers
ID: 33671235
Thanks
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now