<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[How does one audit a home network reasonably?]]></title><description><![CDATA[<p>How does one audit a home network reasonably? Thinking of setting up some self hosted stuff that may involve internet ingress.<br />I can DMZ a machine, but it's an i-dont-know-what-i-dont-know situation. Are firewall rules enough? How much should I actually be worrying about someone getting access to my local network segments?<br /><a href="https://hachyderm.io/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://hachyderm.io/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://hachyderm.io/tags/diy" rel="tag">#<span>diy</span></a> <a href="https://hachyderm.io/tags/selfhosting" rel="tag">#<span>selfhosting</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/0f2e9a36-c100-48ea-b18c-b7297413cdc4/how-does-one-audit-a-home-network-reasonably</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:24:40 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/0f2e9a36-c100-48ea-b18c-b7297413cdc4.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 26 Apr 2026 02:21:59 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to How does one audit a home network reasonably? on Wed, 06 May 2026 19:43:54 GMT]]></title><description><![CDATA[<p><span><a href="https://hachyderm.io/@adangerbartels">@<span>adangerbartels</span></a></span> I used to have all my machines on static addresses and only firewalled on the machines themselves.</p><p>The worst that happened was I stupidly installed Windows 2000 and didn't install SP4 quick enough, and it became a spam relay for a few hours <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f61e.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--disappointed" style="height:23px;width:auto;vertical-align:middle" title=":(" alt="😞" /></p><p>Nowadays my router is an old server running OPNsense, which has some firewall rules, and everything else is on a DMZ with 1:1 static NATs (annoyingly - my ISP won't give me a proper subnet).</p><p>Because most of my servers run web servers, I run a script that searches the logs for obvious script-kiddie type stuff (eg requests for "../../", "/admin" (when I don't have an admin page etc).</p><p>The unique addresses get stored in a text file which is web-accessible, and then OPNsense picks up these files from each web server every few minutes and adds them to a block list, so all my devices are protected.</p><p>Atm, most of my servers have picked up a few hundred IPs, but right now, my Mastodon server has flagged 24k, erk!! I'd better check that out now <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f61e.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--disappointed" style="height:23px;width:auto;vertical-align:middle" title="😞" alt="😞" />.</p><p>I also download the <span><a href="/user/stratosphere%40infosec.exchange">@<span>stratosphere</span></a></span> blocklists daily, and I have manually blocked some IPs (like Metas IPv4 and IPv6 scanners).</p><p>So far so good, I have been doing this for over 3 years, and I have been fine.</p><p>I used to expose SSH to the internet, but not any more - I just use Wireguard (which is built into OPNsense) first before I connect to any admin interfaces using the internal addresses.</p><p>If you wanted to try doing a security scan, you could try this: <a href="https://openvas.org/" rel="nofollow noopener"><span>https://</span><span>openvas.org/</span><span></span></a></p><p>I've not used it for a while, but it was good, and the free version was enough for me to check for "low-hanging fruit".</p><p>I hope that helps. Feel free to ask me questions <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f600.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--grinning" style="height:23px;width:auto;vertical-align:middle" title="😀" alt="😀" /></p>]]></description><link>https://board.circlewithadot.net/post/https://mammut.gogreenit.net/users/chewie/statuses/116529341036608946</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mammut.gogreenit.net/users/chewie/statuses/116529341036608946</guid><dc:creator><![CDATA[chewie@mammut.gogreenit.net]]></dc:creator><pubDate>Wed, 06 May 2026 19:43:54 GMT</pubDate></item><item><title><![CDATA[Reply to How does one audit a home network reasonably? on Sun, 26 Apr 2026 09:25:51 GMT]]></title><description><![CDATA[<p><span><a href="https://hachyderm.io/@adangerbartels">@<span>adangerbartels</span></a></span><br />you can also consider reverse proxy solutions like Cloudflare Tunnels or ngrok and the likes.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/termux/statuses/116470287679950463</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/termux/statuses/116470287679950463</guid><dc:creator><![CDATA[termux@infosec.exchange]]></dc:creator><pubDate>Sun, 26 Apr 2026 09:25:51 GMT</pubDate></item></channel></rss>