importing ip ranges list as a text file in angry ip scanner [closed]

I don’t know how to correctly import IP ranges in a text file for angry ip scanner. I copied the IP ranges from some website and import them in a .txt file like

45.5.0.0-45.5.3.255 45.5.15.0-45.5.15.255 45.5.20.0-45.5.23.255 45.5.24.0-45.5.27.255 

but the angry ip scanner just scanned the first IPs and not the ranges. I have no idea how to import IP ranges correctly. I also did something like 192.168.1.1/24 but it didn’t work either.

Preventing Users from Using QR Code Password and Scanner for Authentication

A user was discovered using a QR code to log into a PC. Apparently, the password was put into a QR code generator and printed. The user:

  1. Provides their username
  2. Scans the QR code with a handheld scanner and is granted access

Our company utilizes handheld scanners for a variety of reasons so it is not feasible to use endpoint protection USB device control to block all scanners or brands of scanners. This user also uses handheld scanners for everyday work duties. We are curious of a creative way to prevent this technically. We also plan on addressing this administratively through policy. One idea was floated that if possible (through GPO):

  1. Having a startup script to disable scanners
  2. A log off script to disable scanners
  3. A login script to re-enable the scanner

The handheld scanner apparently shows as a generic HID keyboard in device manager. Does anyone know of a feasible way to block this or perhaps an alternative solution to the problem (blocking the device at login)? Thank you!

Can any tools/tactics produce a higher confidence in a clean system than Microsoft Security Scanner?

In the process of trying to recover data in bulk from what I assumed was a failing hard drive, Windows Security kindly notified me it had found a handful of malicious items among the recovered files. I immediately nuked that secondary drive, but for a few items it reported either “Remediation Failed” or “Item removed or restored from quarantine”.

I did a full scan, then an offline scan, and a full scan in safe mode with Security Scanner, all of which found nothing. I have not seen any symptoms that match the items it detected, and have read that those two concerning reports are a common artifact of manually deleting items it found.

My finger is hovering over the “nuke it from orbit” button anyway, but for now I think this an interesting question: Obviously nothing can guarantee it, but what tools, techniques, or combinations thereof that can produce a higher confidence than just running Microsoft’s tools in sequence? Perhaps some combination of tools run on a Linux CD/USB?

vulnerability scanner report to SIEM

Our partners require such configuration as

1) vulnerability scanner A (well known in CIS area)

2) SIEM B (leaders of the market)

And they should perform a scan of the network, get a report then forward it to the SIEM supposedly to challenge the findings against IOC’s.

Isn’t it better to use let’s say NEssuss vulnerability management?

I don’t have wide experience in Security — a bit less than 5 years 😀 — the insist to get the report into the SIEM — we don’t want to argue with them.

Sooo challenging report against IOC’s VIA SIEM : does it sound right to you?

epson WF-2660 MFP ubuntu 18.4 says no scanner deteced but does print without problems

OK being new to ubuntu I was pulling my hair out with all the complicated (to a new user) suggestions but I thought I should post how I fixed my problem. I use a VPN & I guess the IP address conflicts with the router address so I turned the VPN off & guess what the scanner is then detected & scans (printer is wi fi connected) so then I turn the VPN on & at least I can scan & am now happy

How do i configure the fingerprint scanner?

I’m new to the linux world in general and ubuntu…I read a few threads and tried out some of the solutions posted but couldn’t get it to work. I have an ASUS UX430UA and the fingerprint scanner is Elan Microelectronics Corp. as listed under lsusb. Can someone help me install it and make it work? (remember I’m new and have no idea how to install things and clueless about what I’m doing when I type in the terminal) Thanks in advance

`scanimage` does not find scanner on server


Setup:

System A:

saned server and qemu-kvm host, ubuntu 18.04.
I configured the server following ubuntu instructions at https://help.ubuntu.com/community/SaneDaemonTutorial

scanimage -L returns:

device `epson2:libusb:001:029' is a Epson GT-X900 flatbed scanner 

This identification is incorrect, my scanner is an Epson Perfection V700 Photo, but I can scan documents flawlessly on it using the epson2 backend, as I have since ubuntu 10.04 with the same scanner.
Note that it does not show the saned device.

> systemctl status saned.socket ● saned.socket - saned incoming socket    Loaded: loaded (/lib/systemd/system/saned.socket; enabled; vendor preset: enabled)    Active: active (listening) since Tue 2019-09-10 14:55:34 BST; 6h ago    Listen: [::]:6566 (Stream)  Accepted: 2; Connected: 0     Tasks: 0 (limit: 4915)    CGroup: /system.slice/saned.socket  Warning: Journal has been rotated since unit was started. Log output is incomplete or unavailable. 

System B:

Client, qemu-kvm virtual machine under host A, ubuntu 10.04.
This is a clone of a physical system on which the scanner worked flawlessly (plugged directly via USB, now moved to system A).

scanimage -L fails to detect the scanner on the saned server (system A).

I tried scanimage -d with a variety of device names, but all fail with scanimage: open of device <devicename> failed: Invalid argument, device names I tried:

epson2:net:<ip-systemA> net:<ip-systemA>:epson2:libusb:001:029 net:<ip-systemA>:epson2 net:<ip-systemA> epson2 "epson2:net;<ip-systemA>" 

I can ping <ip-systemA> (pings) and telnet <ip-systemA> 6566 (connects) successfully, so I know that saned on system A is accessible from system B.

Problem:

I can’t seem to find a way to make system B see the scanner on system A.
I am not sure whether I have an incomplete server or client configuration.