How do you know if your computer or network is truly hacker proof? Just because your home computer came with a firewall by Symantec or your IT manager installed a new Cisco Pix, that does not mean you are protected.
Unlike when someone breaks into your home or office and there are physical signs showing that you have become a victim of burglary, when a hacker breaks into your computer there are no obvious signs. Your mouse won't start squeaking and your keyboard will not start typing "I'm being hacked...HELP!"
In the movies, they portray a hacker (actor) sitting in front of a computer and within in seconds (not minutes) the hacker has hacked into a bank, government networks, his schools computer, his girlfriend laptop or a social media account like Facebook or Twitter.
In reality it does not work that way. Here are the 5 steps of computer hacking:
- Reconnaissance (research) - Gathering information about the target. Just like a professional team who watches the video tapes of their opponents before game time, looking for the weakness and strength of their opponents, so does a hacker looking for the strengths and weaknesses in your network or website.
- Scanning/Vulnerability check – This is what AmIHackerProof.com performs. AmIHackerProof.com scans website, computer or network just like a hacker would. Below is a list of scanning phases and checks AmIHackerProof.com performs.
- Gaining Access – this is the penetration or hacking phase. Using the information found in #2 Scanning/Vulnerability check.
- Maintaining Access – Once a hacker gains access, he wants to keep access. He does this by setting up backdoors, adding phantom accounts or even installing spyware.
- Cover Tracks – What makes a “Great” thief is being able to sneak in and get out without leaving any trace. A “Great” hacker compared to an “ok” hacker can get in and out without leaving a trace.
For more information on computer hacking and the different stages click here to download the .PDF “Introduction To Ethical Computer Hacking."
To find out if you are hacker proof. This service is for:
Consumers - Every 6 seconds a personal computer is hacked into. How do you know if your computer hacker proof? Don't trust that firewall that came installed on your personal computer. Don't even trust that firewall that is built into that Linksys or D-Link router.
Small to Medium Businesses - If you wanted to have a certified computer security expert audit your network to see if you are truly hacker proof, it could cost you thousands of dollars. AmIHackerProof.com can give you the same if not more detailed information than most experts.
CEO/Presidents/Mayors/Management - How do you know if your company or government network is truly secure? When was the last time your IT Manager or CTO gave you a security audit report generated by a outside consultant? If you can't remember then you definitely need AmIHackerProof.com.
IT/CTO/Consultants - Need to run an independent on audit? Don't have the large budget to hire an outside computer security auditor? In the field and want to run an audit from your cell phone or even your iPad? Tired of paying expensive annual subscriptions to use some below average audit software? If you can answer yes to any of these, then you need AmIHackerProof.com!
Which scan should you select?
Quick Scan - This scan will search your network for vulnerabilities on the most common ports and intergrate the results about your network into a easy to read reports. This scan is used to retrieve some basic information about your networks and some vulnerabilities that exist.
Complete Scan - This scan will search all ports (TCP and UDP) for any vulnerabilities that exits. All the details will be compiled into a nice report and suggestions about fixing these problems will also be shown.
Web Site Scan - This scan will only search your web site for vulnerabilities. Great for sites that have just been launched or sites that need to be scanned quickly scanned for vulnerabilities.
What does AmIHackerProof.com actually do?
Discover Your Device - To improve performance, AmIHackerProof.com can verify that hosts (computers) are alive (online) before scanning them.
Service Discovery - Before running any vulnerability tests, AmIHackerProof.com performs a port scan on each device (computers, firewall and/or routers) to determine what services are running.
Plugins - Most hacks to WordPress and Joomla websites come from older versions of the installed plugins. AmIHackerProof.com looks for all of the outdated plugins.
What does AmIHackerProof.com actually do?
Vulnerability Checks - There are 65,000+ ports on a computer. For every port that is found open there is another chance for a hacker to gain access to your computer. So if you have 5 open ports that can be 5 ways a hacker can gain access to your computer. Depending on the test you select, AmIHackerProof.com will scan up to 65,000 ports.
Web Spidering - AmIHackerProof.com can crawl web servers to determine the complete layout of a web site. Spider results are then used to evaluate custom web applications for common problems such as SQL injection, cross-site scripting (CSS/XSS), backup script files, readable CGI scripts, insecure use of passwords, and many other issues resulting from custom software defects or misconfigurations.
Database Servers - AmIHackerProof.com scans most popular database servers for vulnerabilities, including Microsoft SQL Server, Sybase, Oracle, IBM DB2, IBM DB2/400, Postgres and MySQL.
Web Servers - AmIHackerProof.com scans web servers for vulnerabilities.
Telnet Servers - AmIHackerProof.com can scan Telnet servers for vulnerabilities. Telnet is an unstructured protocol, with many varying implementations. This makes it prone to inaccurate results.
Recommendations - For every vulnerability found AmIHackerProof.com will give a recommendation on how to fix.
Finds User Names - AmIHackerProof.com can read the login usernames for some content management systems, like WordPress and Joomla.
DOS Attack - AmIHackerProof.com will test a network or website for a DOS attack and analysis how long it will take to take down a website or network.
Plugins & Components - AmIHackerProof.com will find all out of date and exploitable Plugins/Components for WordPress and Joomla.
Recommendations - AmIHackerProof.com will perform a SQL Injection to see if any of the databases are vulnerable to this type of attack.
SQL Injection - Booby Trap will allow you to send a "Booby Trap" e-mail to your personal e-mail account. A "Booby Trap" e-mail will let you know if anyone is reading your e-mails without your knowledge. It will return the IP address of the person as well as give you a location of where the person read the e-mail.
Screen Shots Showing How Easy & Simple To Operate AMIHackerProof is: