Author Topic: How the wifi inspector decide if the network and devices are secure or not?  (Read 2317 times)

0 Members and 1 Guest are viewing this topic.

Offline ddabrahim

  • Jr. Member
  • **
  • Posts: 66
Hi.

When I scan my network Avast analyse the devices on my network and report each device is "secured" and also that my network is secure.
I was wondering how Avast actually decide if the network and the devices are secure.

So if a hacker start scanning my devices for open ports and try to connect, would avast actually notice that if a device behave suspicious on the network or in case a device have open ports? Or what does it actually mean a device is "secured" how exactly Avast "secured" the device?

I mean "secure, secured, safe" is nice words and the green colour is calming but I would like to actually know and understand how it is actually works.
Could anyone please explain? I would appreciate any help.

Thanks.

Offline Radek Brich

  • Developer (Linux AV, Mac AV)
  • Moderator
  • Jr. Member
  • *
  • Posts: 54
Re: How the wifi inspector decide if the network and devices are secure or not?
« Reply #1 on: September 07, 2020, 09:25:31 AM »
Hi, "This device is secured" means that Avast did not found any known vulnerabilities. The network scanner is actively testing the devices with a set of detections, for example: weak password, authentication bypass and other exploitable spots in admin interfaces. There are currently around a hundred of these detections, where most of them are specific to some router model or vendor. Some generic issues are listed here: https://help.avast.com/en/av_mac_free/14/hns/hns-vulnerable.html#issue_list

Quote
So if a hacker start scanning my devices for open ports and try to connect, would avast actually notice that if a device behave suspicious on the network or in case a device have open ports?

No, Avast won't notice suspicious behavior on the network, it can't do that from the position of normal device. It works more like a prevention - the scan searches for vulnerabilities of other devices in the network and reports them, so you know about the weak spots before an attacker can exploit them.