{"id":828,"date":"2017-01-02T13:47:25","date_gmt":"2017-01-02T11:47:25","guid":{"rendered":"https:\/\/community.virtono.com\/?p=828"},"modified":"2017-01-02T13:47:25","modified_gmt":"2017-01-02T11:47:25","slug":"russian-cyber-attack-on-us-what-does-cyber-attack-means","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/russian-cyber-attack-on-us-what-does-cyber-attack-means\/","title":{"rendered":"Russian Cyber Attack on US : What Does Cyber Attack Means?"},"content":{"rendered":"<p>The US elections of 2016, were full of surprise and twist, the main being the outcome. But no one saw this coming,\u00a0when CIA said that Kremlin-directed a cyber campaign to influence the US election, the world was more than shocked, so today we look at what exactly a Cyber Attack Means?<\/p>\n<p>In to<\/p>\n<p>Your computer systems and applications require one of the most fundamental communications systems in your organization \u2014 your network. Although many organizations don\u2019t completely rely on wireless networks for everything, others do. Either way, your wireless network likely depends on critical servers; you can\u2019t afford to have them compromised via the network. These computers, even if they\u2019re an ancillary part of your overall network, are there for business reasons; damage them, damage the business. Therefore it\u2019s important to understand just what can happen when network-based 802.11 vulnerabilities are exploited.<\/p>\n<p>There are thousands of possible network-level vulnerabilities on your wireless systems \u2014 and seemingly just as many tools and testing techniques. The key point to remember here is that you don\u2019t need to test your wireless network for every possible vulnerability, using every tool available and technique imaginable. Instead, look for vulnerabilities that can have a swift and immediate impact on your systems.<\/p>\n<p>I am listing a number of ways you can try and remain safe online.<\/p>\n<p>TOOLS:<\/p>\n<p>The following are some of the popular tools available for scanning:<\/p>\n<p>Nmap<\/p>\n<p>Nmap is a popular open-source tool for network discovery and security auditing that works on different platforms like Linux, Windows and Mac. It basically comes in the form of a command line interface; however, to facilitate the ease of use it is also available in a GUI format called Zenmap. For Windows machines, you can install the \u201cself-installer\u201d version of Nmap that comes in the \u201c.exe\u201d format. The download link for the same in available below: Nmap Download: http:\/\/nmap.org\/download.html<\/p>\n<p>The \u201cTarget\u201d box needs to be filled with the target IP address or domain name on which you want to perform the scan. It also comes pre loaded with 10 different scan profiles that you can select from.<\/p>\n<p>Intense Scan<\/p>\n<p>This scan type should be reasonably quick as it only scans TCP ports. Additionally, it makes an attempt to detect the OS type, various services and their version numbers that are running on the target machine.<\/p>\n<p>Intense Scan Plus UDP It is the same Intense scan as described above but also includes scanning of UDP ports.<\/p>\n<p>Intense Scan, all TCP Ports Unlike the normal Intense scan which only scans a list of 1000 most common ports, the \u201cIntense scan, all TCP ports\u201d scans all available 65535 ports.<\/p>\n<p>Intense Scan, No Ping This option will exclude pinging the target from the Intense scan. You may use this option when you already know that the target is up or is blocking ping requests.<\/p>\n<p>Ping Scan<\/p>\n<p>This option will only ping the target but does not perform port scanning of any type.<\/p>\n<p>Quick Scan<\/p>\n<p>Scans faster than the Intense scan by limiting the number of TCP ports scanned to only the top 100 most common TCP ports.<\/p>\n<p>Quick Scan Plus Quick scan plus adds OS detection and a bit of version detection features to Quick scan.<\/p>\n<p>Quick Traceroute This option will show you the route that the packets take to reach the target starting with the localhost (source or your own computer).<\/p>\n<p>Regular Scan<\/p>\n<p>This will perform the ping and TCP port scan of 1000 default ports on the target.<\/p>\n<p>Slow Comprehensive Scan<\/p>\n<p>This scan will try all possible options to uncover as much information as it can about the target. It uses three different protocols: TCP, UDP and SCTP in order to detect hosts. Out of all the 10 scanning options, I reckon Intense Scan to be appropriate under most conditions. Just fill the \u201cTarget\u201d box, select the \u201cIntense scan\u201d profile and hit the \u201cScan\u201d button. Let us now analyze the Nmap result output by running it on a sample target. After the scan is completed the \u201cNmap Output\u201d tab displays the raw output of all the scan operations such as the date and time it was performed, the results from ping scan, discovered open ports, target OS and traceroute.<br \/>\nThe other tabs split the same results into an organized manner so as to display them in a more user friendly manner using GUI interface. The \u201cPorts\/Hosts\u201d tab will display a list of discovered ports, their status as to whether they are closed or open, the protocol associated and the services running on them.<\/p>\n<p>You can use the \u201cAutomated Tools\u201d to quickly perform port scan and grab vital information about the target such as DNS records, Whois data, Traceroute details all from a single place. On the other hand the \u201cManual Tools\u201d section contains individual tools specially crafted to give more control in the scanning process for advanced users.<\/p>\n<p>Online Tools<\/p>\n<p>You can also make use of online tools to perform port scan and discover important information about the target. The following are some of the links useful online network tools that are worth considering:<\/p>\n<p>PenTest-Tools<\/p>\n<p>YouGetSignal<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US elections of 2016, were full of surprise and twist, the main being the outcome. But no one saw this coming,\u00a0when CIA said that Kremlin-directed a cyber campaign to influence the US election, the world was more than shocked, so today we look at what exactly a Cyber Attack<\/p>\n","protected":false},"author":3,"featured_media":829,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/hacking-myspace-735x400.jpg?fit=735%2C400&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-dm","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":3595,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/how-to-protect-your-server-against-brute-force-attacks\/","url_meta":{"origin":828,"position":0},"title":"How to Protect Your Server Against Brute Force Attacks","author":"George B.","date":"June 23, 2023","format":false,"excerpt":"Introduction Brute force attacks are one of the most common threats that server administrators face. This guide is designed to provide you with the knowledge and strategies you need to protect your server from brute force attacks. What is a Server Brute Force Attack A server brute force attack is\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":749,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/hunt-down-apts-with-big-data-analytics\/","url_meta":{"origin":828,"position":1},"title":"HUNT DOWN  APTs WITH BIG DATA ANALYTICS","author":"Daniel Draga","date":"November 11, 2016","format":false,"excerpt":"ORGANIZATIONS THAT START to address information security in a meaningful way will come to a point in their maturity when they have a lot of machine data. The challenge many CISOs face is how to leverage that data quickly and correlate events dynamically across the enterprise to track down advanced\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":760,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","url_meta":{"origin":828,"position":2},"title":"3 major challenges in Cloud security","author":"Daniel Draga","date":"November 17, 2016","format":false,"excerpt":"Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2082,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/black-friday-2020\/","url_meta":{"origin":828,"position":3},"title":"Black Friday 2020","author":"Virtono","date":"November 27, 2020","format":false,"excerpt":"The best Web Hosting & Cloud VPS Black Friday deals are here. The discount coupon codes will work from Black Friday, 27 November 2020 to Cyber Monday, 30 November 2020, but the stocks for some of our products are limited, so hurry to catch the best offer! 1) 60% OFF\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"Black Friday 2020","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/11\/blacksale-3.jpg?fit=1200%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/11\/blacksale-3.jpg?fit=1200%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/11\/blacksale-3.jpg?fit=1200%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/11\/blacksale-3.jpg?fit=1200%2C500&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/11\/blacksale-3.jpg?fit=1200%2C500&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":267,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/types-of-servers\/","url_meta":{"origin":828,"position":4},"title":"Types Of Servers","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"File Servers A file server may be dedicated or non-dedicated. \u00a0A dedicated server is designed specifically for use as a file server\u00a0 not for other database purposes. File servers may also be categorized by the method of access: Internet file servers are frequently accessed by File Transfer Protocol (FTP) or\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1060,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/freemilk-new-phishing-campaign-to-hijack-email-conversations\/","url_meta":{"origin":828,"position":5},"title":"FreeMilk : New phishing campaign to hijack email conversations","author":"Shreyash Sharma","date":"October 8, 2017","format":false,"excerpt":"A new threat has been identified by\u00a0\u00a0Palo Alto Networks security researchers, it is a\u00a0phishing campaign used by hackers to intercept ongoing email conversations between individuals and hijack them to deploy malware.The focus on even now believes they are in contact with the particular person they had been at first messaging,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=828"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/828\/revisions"}],"predecessor-version":[{"id":830,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/828\/revisions\/830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/829"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}