For years I have been using the Fing iOS app to scan my home network to check for unknown devices. The iOS apps is nice and self contained, so I never worried much about its own security.
I recently downloaded the Windows Fing desktop application. Worked great, has a easy interface, and provides better results than other scanners I have tried.
BUT … The desktop app requires one to create a Fing account, and the results of the scan are uploaded to Fing cloud. So basically now my external IP, all my internal IPs, and all my device’s MACs are on the cloud. At first blush this seems like a huge security concern.
Has anyone encountered any security issues with the Fing service?
I’m reading a white hat hacking book from a famous certification. They say the methodology for hacking a web server is:
- information gathering (domain name, DNS, IP, etc.)
- footprinting (ex: banner grabing)
- website mirroring
- vulnerability scanning
- session hijacking
- password cracking
Apart from session hijacking and information gathering, I don’t see why I would not just launch Acunetix Web App Scanner and/or Nessus to find all weaknesses.
What is the point of performing manual tests if you can automate them?
For instance, if the vulnerability scanner does not know how to find vulnerable cookies, and if I manually find a way to do session hijacking, I wont be able to train Acunetix of Nessus for that. Even if I did, I don’t how beneficial it would be.
Please explain to me why I would not just let my tool do the hacking for me.
I don’t know how to correctly import IP ranges in a text file for angry ip scanner. I copied the IP ranges from some website and import them in a .txt file like
22.214.171.124-126.96.36.199 188.8.131.52-184.108.40.206 220.127.116.11-18.104.22.168 22.214.171.124-126.96.36.199
but the angry ip scanner just scanned the first IPs and not the ranges. I have no idea how to import IP ranges correctly. I also did something like 192.168.1.1/24 but it didn’t work either.
A user was discovered using a QR code to log into a PC. Apparently, the password was put into a QR code generator and printed. The user:
- Provides their username
- Scans the QR code with a handheld scanner and is granted access
Our company utilizes handheld scanners for a variety of reasons so it is not feasible to use endpoint protection USB device control to block all scanners or brands of scanners. This user also uses handheld scanners for everyday work duties. We are curious of a creative way to prevent this technically. We also plan on addressing this administratively through policy. One idea was floated that if possible (through GPO):
- Having a startup script to disable scanners
- A log off script to disable scanners
- A login script to re-enable the scanner
The handheld scanner apparently shows as a generic HID keyboard in device manager. Does anyone know of a feasible way to block this or perhaps an alternative solution to the problem (blocking the device at login)? Thank you!
In the process of trying to recover data in bulk from what I assumed was a failing hard drive, Windows Security kindly notified me it had found a handful of malicious items among the recovered files. I immediately nuked that secondary drive, but for a few items it reported either “Remediation Failed” or “Item removed or restored from quarantine”.
I did a full scan, then an offline scan, and a full scan in safe mode with Security Scanner, all of which found nothing. I have not seen any symptoms that match the items it detected, and have read that those two concerning reports are a common artifact of manually deleting items it found.
My finger is hovering over the “nuke it from orbit” button anyway, but for now I think this an interesting question: Obviously nothing can guarantee it, but what tools, techniques, or combinations thereof that can produce a higher confidence than just running Microsoft’s tools in sequence? Perhaps some combination of tools run on a Linux CD/USB?
Our partners require such configuration as
1) vulnerability scanner A (well known in CIS area)
2) SIEM B (leaders of the market)
And they should perform a scan of the network, get a report then forward it to the SIEM supposedly to challenge the findings against IOC’s.
Isn’t it better to use let’s say NEssuss vulnerability management?
I don’t have wide experience in Security — a bit less than 5 years 😀 — the insist to get the report into the SIEM — we don’t want to argue with them.
Sooo challenging report against IOC’s VIA SIEM : does it sound right to you?
I’m reading a book and it was cited an this blog article : https://zaproxy.blogspot.com/2017/04/exploring-apis-with-zap.html The problem here
Tengo un dispositivo Zebra con scanner integrado.
Como puedo hacer que al leer un código (Con el scanner del dispositivo) haga la funcion (OnClickListener) de un botón virtual.
OK being new to ubuntu I was pulling my hair out with all the complicated (to a new user) suggestions but I thought I should post how I fixed my problem. I use a VPN & I guess the IP address conflicts with the router address so I turned the VPN off & guess what the scanner is then detected & scans (printer is wi fi connected) so then I turn the VPN on & at least I can scan & am now happy
I’m new to the linux world in general and ubuntu…I read a few threads and tried out some of the solutions posted but couldn’t get it to work. I have an ASUS UX430UA and the fingerprint scanner is Elan Microelectronics Corp. as listed under lsusb. Can someone help me install it and make it work? (remember I’m new and have no idea how to install things and clueless about what I’m doing when I type in the terminal) Thanks in advance