Skip to main content

How can I do a basic check of my internet security at my home or office?

I worry about internet security for my home office or business what do I do?

This isn't meant to be an all inclusive guide to perimeter or firewall security, but if you worry about the security of your home, home office, or small business internet. Here's a great tip to use your cellphone as an infosec tool to assess the security of your perimeter. So let's dive right in:

  1. From a computer on the network you'd like to test go to 
  2. Take note of the IPV4 address, this what we call your real world IP address we're going to need it in the next step.
  3. Download Fing from the android or iOS app store. 
  4. Open Fing Click Tools at the bottom then click "Find open ports" Input the IP you got from step 2. 
  5. Before you click scan make sure to turn the Wi-Fi off on your device, you want to simulate an external scan of your network, and your cellphone disconnected from Wi-Fi does a good enough job of representing that for a quick and dirty test like this. 
  6. The results will identify different ports and services, sometimes with a short description or explanation of what the service related to the part does. Here are just a few to watch out for especially if you don't have a reason for these services to be available outside of your home or office but if you do I would maybe reconsider using a VPN to access these services:
    1. 80, 8080, 443: Usually used for web based control panels for routers and other networking and inter-faceless equipment. 
    2. 3389, 5900: Remote desktop ports for Windows and VNC (Mac/Linux/Windows)
    3. 137, 138, 139, 445: These ports are found in Windows Networking and File Sharing
    4. 548: Apple Filesharing Protocol 
    5. 22: SSH used to remote manage and control computers. 
    6. If you find a port that I didn't list google: what does x port do? to find your answer.
  7. Careful I just taught you how to port scan so now you have to promise to only do it to things you own or you could get in serious trouble. 


Popular posts from this blog

Why traditional Pen Testing is dead.

Annual, bi-annual, and quarterly penetration testing schedules will be a thing of the past.  The advent of sophisticated cyber threats has necessitated a paradigm shift in vulnerability management. In this transformative digital era, the static, once-a-year model of traditional penetration testing is becoming increasingly obsolete. Instead, it's time for businesses to embrace a dynamic model of continual vulnerability detection and mitigation - Penetration Testing as a Service (PTaaS) by Xcape, Inc. This innovative service combines the precision of automated remote pen testing with the strategic oversight of seasoned penetration testers, creating a comprehensive solution for the latest cybersecurity concerns. The Case for Internal and External Network Testing In a conventional cybersecurity setup, the focus is often on safeguarding the external network, the so-called perimeter. However, this perimeter-centric approach, while essential, is not sufficient in today's threat land

Have you tested your backup recently?

We're in the business of helping people, so when a business owner reached out for assistance during a ransomware attack they had experienced, our first question was, "When was your most recent backup?" The owner said his CTO assured him they backed up their Amazon Web Services infrastructure.  Well, they had one snapshot from several years ago, which wouldn't do anything for them. Of course, we always feel bad for giving business owners awful news. But, sometimes, even as experts without the absolute minimum being done technically, we're only left with a few options in ways we can help. So we reversed-engineered and created a decryption application based on the ransomware sample we recovered during our investigation. Recovering over 3 TB of data in the process. While that's not always a possibility, in this case, many things went right for us during the investigation.  Is there a better way to handle ransomware attack recovery ? YES! But the issue wasn't t

How secure is your SMB's domain name?

Studies show that small businesses are being targeted now more than ever in cyber attacks. ( Forbes: Small Businesses Are More Frequent Targets Of Cyberattacks Than Larger Companies ) When cybersecurity professionals discuss two-factor authentication, domain registrars or DNS hijacking is often not the topic. (Think 2FA for GoDaddy , NameCheap , and SquareSpace , to name a few. Take a moment and use these links to setup 2fa for your domain, or google "How to turn on 2fa for name of provider .") Surprisingly, even in 2023, some providers still don't support this essential security control.  However, your domain name controls an organization's corporate website and email exchange records. And suppose an attacker were to get control of it. In that case, they could recreate your email addresses, and password reset their way to control all the accounts owned by an organization.  A few of the recent incidents we've responded to involve attacks where the attacker obtains