ShieldsUP

Last updated

ShieldsUP is an online port scanning service created by Steve Gibson of Gibson Research Corporation. The purpose of the utility is to alert the users of any ports that have been opened through their firewalls or through their NAT routers, which can be used by malicious users to take advantage of security vulnerabilities. The utility scans the most common file sharing ports, as well as all service ports (1-1056), and user defined ports, in sets of 64. [1]

Contents

It is often recommended for checking port vulnerabilities. [1] [2] [3] [4] [5] [6] [7]

The scanning servers have the static IP addresses of 4.79.142.192 to 4.79.142.207. [8]

See also

Related Research Articles

Nmap Network scanner

Nmap is a network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.

Network security Computer network access control

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Internet security Branch of computer security specifically related to Internet, often involving browser security and the World Wide Web

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called single packet authorization (SPA) exists, where only a single "knock" is needed, consisting of an encrypted packet.

Application firewall Layer 7/application layer network security system

An application firewall is a form of firewall that controls input/output or system calls of an application or service. It operates by monitoring and blocking communications based on a configured policy, generally with predefined rule sets to choose from. The application firewall can control communications up to the application layer of the OSI model, which is the highest operating layer, and where it gets its name. The two primary categories of application firewalls are network-based and host-based.

AVG AntiVirus

AVG AntiVirus is a line of antivirus software developed by AVG Technologies, a subsidiary of Avast. It is available for Windows, macOS and Android.

Steve Gibson (computer programmer) Computer enthusiast, software engineer and security researcher

Steven "Steve Tiberius" Gibson is an American software engineer, security researcher, and IT security proponent. In the early 1980s, Gibson worked on light pen technology for use with Apple and Atari systems. In 1985, he founded Gibson Research Corporation, best known for its SpinRite software.

Microsoft Defender Anti-malware software

Windows Security is an anti-malware component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP, and was later shipped with Windows Vista and Windows 7. It has evolved into a full antivirus program, replacing Microsoft Security Essentials, as part of Windows 8 and later versions.

Norton Internet Security, developed by Symantec Corporation, was a computer program that provided malware protection and removal during a subscription period. It used signatures and heuristics to identify viruses. Other features included a personal firewall, email spam filtering, and phishing protection. With the release of the 2015 line in summer 2014, Symantec officially retired Norton Internet Security after 14 years as the chief Norton product. It was superseded by Norton Security, a rechristened adaptation of the Norton 360 security suite.

<i>Hacking: The Art of Exploitation</i> 2003 book by Jon "Smibbs" Erickson

Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. It was published by No Starch Press in 2003, with a second edition in 2008. All of the examples in the book were developed, compiled, and tested on Gentoo Linux.

Defensive computing is a form of practice for computer users to help reduce the risk of computing problems, by avoiding dangerous computing practices. The primary goal of this method of computing is to be able to anticipate and prepare for potentially problematic situations prior to their occurrence, despite any adverse conditions of a computer system or any mistakes made by other users. This can be achieved through adherence to a variety of general guidelines, as well as the practice of specific computing techniques.

Kaspersky Internet Security

Kaspersky Internet Security is an internet security suite developed by Kaspersky Lab compatible with Microsoft Windows and Mac OS X. Kaspersky Internet Security offers protection from malware, as well as email spam, phishing and hacking attempts, and data leaks. Kaspersky Lab Diagnostics results are distributed to relevant developers through the MIT License.

Firewall (computing) Software or hardware-based network security system

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for their antivirus software Avira Free Security. Avira was founded in 2006, but the antivirus application has been under active development since 1986, through its predecessor company H+BEDV Datentechnik GmbH. As of 2021, Avira is owned by American software company NortonLifeLock, after being previously owned by investment firm Investcorp.

HCL AppScan, previously known as IBM AppScan, is a family of desktop and web security testing and monitoring tools formerly from the Rational Software division of IBM. In July 2019, the product was acquired by HCL Technologies and currently slated under HCL Software, a product development division of HCL Technologies. AppScan is intended to test both on-premise and web applications for security vulnerabilities during the development process, when it is least expensive to fix such problems. The product scans the behavior of each application, whether an off-the-shelf application or internally developed, and develops a program intended to test all of its functions for both common and application-specific vulnerabilities. This family of product is capable of performing SAST, DAST, IAST and Mobile Analysis against the user's source code and check for vulnerabilities.

Heartbleed Security bug in OpenSSL

Heartbleed was a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed could be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. It resulted from improper input validation in the implementation of the TLS heartbeat extension. Thus, the bug's name derived from heartbeat. The vulnerability was classified as a buffer over-read, a situation where more data can be read than should be allowed.

Norton, formerly known as Norton by Symantec, is a division of NortonLifeLock, and is based out of Mountain View, California. Since being acquired by the Symantec Corporation in 1990, Norton offered a variety of products and services related to digital security. In 2014, it was announced that Norton's parent company Symantec would split its business into two units - one focused on security, and one focused on information management, with Norton being placed in the unit focused on security.

Mirai is a malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a white hat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs' web site, an attack on French web host OVH, and the October 2016 Dyn cyberattack. According to a chat log between Anna-senpai and Robert Coelho, Mirai was named after the 2011 TV anime series Mirai Nikki.

Data center security is the set of policies, precautions and practices adopted to avoid unauthorized access and manipulation of a data center's resources. The data center houses the enterprise applications and data, hence why providing a proper security system is critical. Denial of service (DoS), theft of confidential information, data alteration, and data loss are some of the common security problems afflicting data center environments.

References

  1. 1 2 Ho, Erica (April 7, 2010). "ShieldsUP Tests Your Firewall for Vulnerabilities". Lifehacker . Retrieved December 13, 2018.
  2. Horowitz, Michael (December 5, 2015). "Test Your Router". Router Security. Retrieved December 13, 2018.
  3. Hoffman, Chris (April 9, 2013). "How to Test Your Antivirus, Firewall, Browser, and Software Security". How-To Geek . Retrieved December 13, 2018.
  4. Horowitz, Michael (January 27, 2014). "How and why to check port 32764 on your router". Computerworld . Retrieved December 13, 2018.
  5. Price, Dan (May 19, 2015). "ShieldsUP: Firewall Vulnerability Test Tool". MakeUseOf. Archived from the original on January 23, 2017.
  6. Ellison, Craig (March 15, 2006). "For Home Networkers". PC Magazine . Retrieved December 13, 2018.
  7. O'Donnell, Andy (October 24, 2018). "How to Test Your Firewall". Lifewire . Retrieved December 13, 2018.
  8. Gibson, Steve. "ShieldsUP! — Internet Vulnerability Profiling". Gibson Research Corporation . Retrieved December 13, 2018.