Audit Project

 The first essential part of performing an audit on your own personal network is to determine the range of addresses on your own network. The most common way you can do that is by running the "ipconfig" prompt which will show you your ipv4 address in the xxx.xxx.x.x way, then looking at the subnet underneath you can determine the range of addresses on the network. 

    After that, you can check which devices are online by using the "nmap -sn xxx.xxx.x.x/24" which will in turn ping all of the addresses in that range in order to determine which ones are online. Although this won't scan ports, the next step will be to scan for ports

Utilizing the command "nmap -sV xxx.xxx.x.x/24" will perform a more in depth scan of the devices connected along with what ports are active and it also may show more information such as services running and the versions as well


To identify the operating systems of devices on your network for security purposes, you can use an Nmap command similar to the one before, but with the addition of the `-O` option. This makes the command look like `nmap -O [target IP range]`, which tells Nmap to try and figure out the operating systems of the devices connected to the network.

For a more thorough and detailed scan, you can use the command `nmap -A [target IP range]`. This command does more than just look for operating systems; it also checks service versions, runs Nmap scripts, and performs traceroute. It's important to note that this kind of scan is more aggressive and could potentially disrupt network services because it probes the network and devices more intrusively.

Another useful command is `nmap --script=default,vuln [target IP range]`, which runs scripts to find vulnerabilities across the specified network range. This scan can help you find weak spots in your network and understand what those vulnerabilities could lead to. For example, if it finds a problem with your router, it might suggest updating the router's firmware and changing the default login information as solutions. Following such advice, you would log into your router's web interface, update its firmware, and change the default username and password to protect against unauthorized access. It's also a good time to turn off features like remote management to keep outsiders from accessing your network settings and to enable WPA2 encryption for better Wi-Fi security.

Additionally, you should consider disabling any ports that aren't being used and making sure that all devices connected to your network are updated to the latest software versions. These steps help secure your network by closing unnecessary entry points and ensuring that your devices are not vulnerable to known issues.







Comments

Popular Posts