Peter started HackerTarget.com back in 2007 as an online port scanner using the Nmap port scanner tool. Since those early days the site has been developed into a full service vulnerability scanning service; giving end users an easy and convenient way to access powerful open source security tools.
By utilizing hosted security testing tools on our servers, organisations are able test their Internet perimeter and servers from an external perspective. Many organisations have firewalls or intrusion prevention devices that make testing of the perimeter from an internal system ineffective and prone to errors. More accurate results are possible by probing from the perspective of actual attackers (ie. from the Internet).
In addition to the automated security vulnerability scanners we also offer quality vulnerability assessments by experienced security analysts. Our most popular assessments are based on a fixed price option that has a fast turn around. It provides a system owner with a quick overview of how good (or bad) shape they are in when it comes to security.
Not everyone who runs a website or Internet connected hosts can afford a dedicated network security team. HackerTarget.com can help you whether your resources are limited or you are looking for an affordable way to test your perimeter.
Everyone is a Target
The name HackerTarget comes from the fact that everyone really is a target. It does not matter that you are a small profile organisation, or you do not store credit cards on your systems. Attacks may be targeted at your organisation or you may be merely a target of opportunity.
Here is a quick overview what your system could be used for if it became compromised:
Spam – acting as relays for millions of unsolicited emails, spammers are not just pests they can be costly, chewing through your bandwidth, damaging your reputation and disrupting your email communications when you end up getting blacklisted.
Storage – illegal software, music, video and images will result in a disruption of your services, costly bandwidth and potential for damaging legal issues when the source gets traced back to a computer you own or manage.
Distribution of malware – After compromising your host it is common for it to be used to host exploits on your web server, this means the server you own or manage is being used to compromise other hosts. This can result in blacklisting of your website by Google and other serious consequences for your business.
As a jump point – direct attacks against other systems on the Internet. Tracing the origin of an attack will reveal that the attack came from an IP address under your control.
Data Harvesting – direct attacks against your host to collect customer records, credit card numbers or membership details. Sql injection is a popular method for this as the vulnerability provides direct access to the database.