search
top
Currently Browsing: Linux

Automating NMAP Scans

Automating NMAP Scans

 

Why do I need automation ?

Security analysts just don’t have the time to always run manual tests. Let’s say I wanted to monitor my ports and services open on my external lab IP address. It is not feasible for me to run a scan at 3am every day for the rest of my life. Therefore, if I had a tool that could automatically run a scan, check to see if anything suspicious is found and can alert me if that is the case would be hugely beneficial. In my case, I have created a method to do this and it is a very simple and straight forward method that virtually any one can use!

 

How can I create a NMAP scanning server ?

Servers are pretty easy to put up whether it’s a Virtual Image that’s spun up on a bare box, desktop, or in the cloud. In my case a Linux Ubuntu Server was used. It has a firewall and is assigned an external public IP address. It then has the ability to scan my lab network public IP address to be able to identify any open ports/services. It’s a great way to gain some visibility into knowing if any new ports were opened that shouldn’t have been or were missed.

*WARNING* please be sure that the network you are scanning is your own, or that you have WRITTEN PERMISSION to scan the network you desire. Scanning networks where you have no written permission can lead to legal issues, so please be sure you have permission or ownership of a network before doing so.

Read The Full Post

Research Project – Android Mobile Forensics

Mobile Devices

Today is more of a Throwback Thursday moment that I’d like to share with everyone regarding mobile devices.

So in 2015 in order to Graduate from the B.tech Forensics – Computer Crime program.
We had a year long research project that was conducted by each student.

My focus was on Mobile forensics and particularly on Android devices.

This was a field that was slightly newer to me, but I felt mobile security will play a huge role in the future. We use our mobile devices for just about everything, and this means future cyber attacks will start to hit mobile devices.

Also, at the same time, I was very curious as to what type of information mobile devices hold and contain about us. I hope my research brings out some answers for many people while at the same time posing further questions to explore.

I’ve decided to attach a PDF of my Android Forensics project.
(more…)

top