Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

A question for our network gurus.

Posted on 05/22/2017 9:23:15 AM PDT by LouAvul

I recently installed a Netgear Nighthawk X6 router. I've replaced the default passwords with 10 digit, random, unrelated characters.

Two of my devices (a desktop and a laptop) are running Avast free virus protection.

When I run an Avast scan, it says Service is vulnerable to attacks from within your network. When I click on their recommended solution, they say to update the firmware. I've gone to the Netgear website and it says all is updated.

I recently vacationed in Colorado. I stayed at a private condo and used their wifi. I ran the Avast scan on my laptop. At my home, when I run the scan, I get the above warning. But at the CO condo, it gave me the A.O.K on all counts.

At my home, at any given time, I have six devices in my network. An Android television. Two iPhones. Two laptops. And two desktops.

Is the Avast scan saying my network is vulnerable to being hacked from outside my home? Or is it saying that the devices within my network are subject to being hacked by another device within my network?

thanks


TOPICS: Computers/Internet
KEYWORDS: computer; grc; hacking; internet; internetsecurity; router; security; software

1 posted on 05/22/2017 9:23:16 AM PDT by LouAvul
[ Post Reply | Private Reply | View Replies]

To: LouAvul

Some device on your network may not be up to date?


2 posted on 05/22/2017 9:29:21 AM PDT by smokingfrog ( sleep with one eye open (<o> ---)
[ Post Reply | Private Reply | To 1 | View Replies]

To: smokingfrog

In parameter - troubleshooting - port settings - check the box ignore local communications and / or remove port 80


3 posted on 05/22/2017 9:30:17 AM PDT by A. Morgan (Ayn Rand: "You can avoid reality, but you cannot avoid the consequences of avoiding reality.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: LouAvul
BTW. One of my desktops is running Microsoft Security Essentials and, when I run that scan, I get no such warnings as I do with Avast.

Also, one of the laptops is running AVG. When I run a scan on that computer, ditto, no warning.

4 posted on 05/22/2017 9:30:46 AM PDT by LouAvul (The most High ruleth in the kingdom of men, and giveth it to whomsoever he will.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: smokingfrog

If that’s the case, then the warning only applies to devices already in my network? Nobody uses any of my devices other than my wife and myself.


5 posted on 05/22/2017 9:35:23 AM PDT by LouAvul (The most High ruleth in the kingdom of men, and giveth it to whomsoever he will.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: A. Morgan

I do this by logging onto the Netgear website for my router’s configuration?


6 posted on 05/22/2017 9:36:45 AM PDT by LouAvul (The most High ruleth in the kingdom of men, and giveth it to whomsoever he will.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: LouAvul
https://blog.avast.com/2014/11/04/avast-2015-new-feature-home-network-security-scanning/

Read that. I am assuming that you are running the network security scan.
7 posted on 05/22/2017 9:36:51 AM PDT by PJBankard
[ Post Reply | Private Reply | To 1 | View Replies]

To: LouAvul

Maybe they just want you to install Avast on every computer on your network.


8 posted on 05/22/2017 9:40:09 AM PDT by smokingfrog ( sleep with one eye open (<o> ---)
[ Post Reply | Private Reply | To 5 | View Replies]

To: LouAvul

What device is it saying is vulnerable? This could be anything from an open port on the network to a protocol-based exploit. Does Avast provide any guidance on what’s being scanned?


9 posted on 05/22/2017 9:47:36 AM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LouAvul

But by putting a strong password on your network, you have prevented any unauthorized hackers from getting on to attack you. Avast can’t know this, all it sees is the local machine.


10 posted on 05/22/2017 9:49:50 AM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: LouAvul

One thing you might check is if UPnP is enabled on the router/switch. UPnP is often enabled by default on consumer-grade routers, and it’s a BIG target for exploits.


11 posted on 05/22/2017 9:50:19 AM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
But by putting a strong password on your network

Not exactly. Using a strong password on a single device doesn't protect all of the traffic going through the device. Switches/routers are just "dumb" devices that send traffic to and from a source and destination. If those devices are configured with transport controls such as port forwarding, you could have problems beyond the strong password.

12 posted on 05/22/2017 9:53:28 AM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: LouAvul
Run a scan on all your tcp ports at GRC Shields Up. They are a highly respected security outfit and will scan all your ports remotely. Takes less than a minute. A simple color coded chart will be displayed at the end of the test to show you which ports might be problematic. If everything in the test comes out green, then that is a good sign.
13 posted on 05/22/2017 10:21:58 AM PDT by Governor Dinwiddie (My wish list: https, failover server, six sigma uptime.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

True, but not relevant. In order for internal hackers to attack you, they have to get a non-routable subnet IP by connecting to the router. Then they can use an ARP shout to build their internal routing table, and try to connect to other devices without going through the gateway.


14 posted on 05/22/2017 12:01:57 PM PDT by proxy_user
[ Post Reply | Private Reply | To 12 | View Replies]

To: Governor Dinwiddie

This is not relevant to internal attackers because when you connect to GRC, you are going through the router, and using NAT. An internal attacker could connect directly over the local subnet.


15 posted on 05/22/2017 12:05:02 PM PDT by proxy_user
[ Post Reply | Private Reply | To 13 | View Replies]

To: proxy_user

Whut? Internal hackers? It’s a home network. If they’re already inside, it’s a moot point.

You can ARP from any machine in the network, and presuming it’s a flat architecture (no VLANs), every device on the network is going to be in the ARP table. Not hard to determine endpoint addresses at that point. Gateway isn’t an issue, because a flat network is all Layer 2. No need for routing.

You said the strong password protected the network. Ingress to a network from the Internet is done through open ports. If a port or ports is open to the Internet (e.g. 80, 443, 445, 3389), they can be accessed without using the password associated to the router.


16 posted on 05/22/2017 1:57:56 PM PDT by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 14 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson