How to Scan a Network For Port Vulnerabilities

Overweb :: Midori cluster

Have you ever wondered how secure a network that you set up actually is? Today I would like to share a tool with you that will allow you to easily scan a network for external port vulnerabilities. This tool is called ShieldsUp! and is web based which allows your scan to take place outside of your firewall. Just follow these steps to begin.

Creative Commons License credit: br1dotcom

Step 1: Go to https://www.grc.com/x/ne.dll?bh0bkyd2.

Step 2: When you are ready to begin, click the “Proceed” button.

Step 3: Now choose the ports you would like it to scan. To scan all ports click “All Service Ports.”

When the scan is finished you will see a color-coded graphical display of all your ports as well as a summery . Ports in green are stealth, ports in blue are closed, and ports in red are open. You can also put your mouse over each port to get a short description.

 

Now you can use this information to close any of these open ports in your firewall.  What other tools do you like to use to help prevent network vulnerabilities?

About The Author

Casey

Casey (Surname withheld for contractual and professional reasons) has contributed many great articles on thetechmentor.com. He successfully started his own IT consultancy well over 10 years ago. While going through this tough yet rewarding experience he found there was a terrible lack of focused support out there for computer techs to start their own IT company. So he gravitated towards training and mentoring other computer technicians who want to create a part time or full time income as an IT consultant. He initially wrote thetechmentor.com courses to help computer technicians start their own IT consulting business (or side business). Many articles also help the general public save thousands of dollars in professional help by helping them DIY. He doesn't contribute directly to thetechmentor.com often any more due to leading a full family life and being Technical Director a at major US company (hence the requirement for privacy). However his contributions span over 10 years and some have been extremely popular (with so many comments we had to stop accepting more on some, and thousands of shares although it looks fewer after our change to https - we must get around to fixing that!). Having said this, we work to ensure his work is updated and continues to remain relevant.

Leave A Response

Time limit is exhausted. Please reload CAPTCHA.

* Denotes Required Field