Subscriber Discussion

How To Check For Network/Computer Vulnerabilities

U
Undisclosed #1
Nov 19, 2019

The issue of intrusive cyber events has come up more and more these days and yet I still see/hear of systems with open ports, factory passwords and other issues that concerns me considerably. Quite frankly, I do not feel comfortable with my level of knowledge about the subject.

Axis provides a reasonably readable Hardening Guide. I have not seen this guide for other manufacturers. Anyone know of other manufacturers who provide this? To the integrator out there, what guides do you use? Is there a software application that one could run on their system to audit the system for vulnerabilities (i.e. unused ports, streams, password setting, etc) that can audit a system for these vulnerabilities?

(1)
Avatar
John Scanlan
Dec 02, 2019
IPVM • IPVMU Certified

** - ** *** ** *** feel *********** * ******** ********** ** internal ******** ***** ** * **** investment.

** ***** ******** **** ********* ** our************* *** ** ***** ************ *****, ***** ******** *** ********* ********:

  • ******* ********* ******
  • ******** ********
  • **** / ****** ********* ***********
  • ***** (******* ****)
  • ***.** **************
  • ********* ****** *****
  • ********* ******* *****
  • ********* ****** ********
  • *** ******* *********
  • ******* *****
  • ******** ****** *******
  • ******** ******* ******** *** ***** ************ Systems

*** *** **** **** ** ***** with **** ********* ************ ** *** if ***** *** ********** ******** *** can **** ********* **; *.*: *** an ********** ~$*** *** **** ********* provides ********** **** ******** (****** **** vary):

**** ******* ** **** ***** ***** out *** ****** ******** ****** *** ***** ************, *** *** ******* ** **** forwarding. *** ***** *** ** ***** what ***** *** **** ** **** networks ******* ****** ** ****.

****** ***** ********** *** ***** *** may **** **** ** *** **** to ******* *** ******* ****** ********* your ******* *********. ** ***** **** in ****** ** ********** ********** *** ***** ************. *** **** ******* ****** **** there *** ******* ** ****** ********* pass * ********* *********; *.*. ******, processor, ********* ** ***** ****** ********* utilization ***** *** *** ******* ** email ***/** **** ************.

(1)
(1)
UI
Undisclosed Integrator #2
Dec 02, 2019

** ***** * ******** *********** **** one ***** *** ** ***** ****** to ***** *** ****** *** ***************

****'* **** ** **** *** ********** of ************** *******. *** ** *** **** **** known ************ *** **** ****** **** ** Nessus,*******. *******, ***** *** *********** ************* tools, *** ************ ******** ** *** voltage/CCTV.

(2)
U
Undisclosed #1
Dec 02, 2019

******* ** **** * ****. * want ** ** **** ** **** off ** ******* *** **** **** the ********** *** *** **** ** could ** ****** ******* ******** ** or ****** *** ****. *******, * would *** * ****** **** **** app **** ***** **** ** ***** any ***** ****** *** *** **** a ****** ** ********** ***** *** issues **** **** ********.

UI
Undisclosed Integrator #2
Dec 02, 2019

******/******* ****** ** **** ** *** general *****. **** ******* *** * lot ** ****** ******** **** ***** for *** ** *** ******** *** the *** ************* *****. ******/******* ****** be **** ** **** *** **** there's *************** ** ****.

*** ******-******** ****** **** *******, *** might **** ******* **** *** *******.

**** **** * **** *** **** Nessus ** ******* ******* ** * few ********* ** ******, ** * don't **** *** **** ** ** to *** **.

UM
Undisclosed Manufacturer #3
Dec 02, 2019

***** *** **** ***********'* ********* ****** posted ** ****. **** ** * link:******** **** ** ************ ***** ******** / ********* ******

(1)
New discussion

Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.

Newest discussions