How to find exploits on a computer
Considering open ports and unused network facing services
Feb. 28, 2019 - Willem L. Middelkoop
People pay me to hack them, provided I'll explain how it was done, so future hacks can be prevented. As security consultant, I scan for weaknesses in my clients' apps, webshops and websites. Very often a hack starts by exploiting a security hole that is visible remotely. Read along to learn how hackers find security holes and what you can do to secure them.
Continue reading![Using nmap to scan a hosting server, identifying network facing services and open ports](/blog/2019-02-28_understanding-the-security-concerns-in-shared-hosting/images/i_03_Using-nmap-to-scan-a-hosting-server-identifying-network-facing-services-and-open-ports_500px.png)
![Contagious effect of an hacked website (red indicating trouble)](/blog/2019-02-28_understanding-the-security-concerns-in-shared-hosting/images/i_02_Contagious-effect-of-an-hacked-website-red-indicating-trouble_500px.png)
![Different kinds of hosting: Shared hosting, VPS hosting and dedicated hosting visualised (a circle representing a physical server)](/blog/2019-02-28_understanding-the-security-concerns-in-shared-hosting/images/i_01_Different-kinds-of-hosting-Shared-hosting-VPS-hosting-and-dedicated-hosting-visualised-a-circle-repr_500px.png)
![A typical server in the datacenter, a physical machine that can host apps, webshops and websites](/blog/2019-02-28_understanding-the-security-concerns-in-shared-hosting/images/i_00_A-typical-server-in-the-datacenter-a-physical-machine-that-can-host-apps-webshops-and-websites_500px.jpg)
![Once a hacker knows what software your website uses, its easy to lookup known security holes using databases like cvedetails.com](/blog/2019-02-28_understanding-the-security-concerns-in-shared-hosting/images/i_04_Once-a-hacker-knows-what-software-your-website-uses-its-easy-to-lookup-known-security-holes-using-da_500px.png)
![Keep in mind that help is available - I know my way around servers and cyber security](/blog/2019-02-28_understanding-the-security-concerns-in-shared-hosting/images/i_05_Keep-in-mind-that-help-is-available-I-know-my-way-around-servers-and-cyber-security_500px.jpg)