Researchers Unite To #ScanAllTheThings

  /     /     /  
Publicated : 22/11/2024   Category : security


Researchers Unite To #ScanAllTheThings


Project Sonar community project launched for sharing Internet-scanning data, tools, and analysis



HD Moores Internet-scanning projects are epic: The renowned researcher has exposed major holes in embedded devices, home routers, corporate videoconferencing systems, and other equipment on the public Internet that is open to abuse by bad guys. But even with the groundbreaking findings by Moore and other researchers of these sitting-duck systems, for the most part the devices remain exposed and unfixed.
Moore and his counterparts hope that will change with the help of a newly formed community Internet-scanning initiative called Project Sonar, which was announced this week by Rapid7, where Moore serves as chief research officer. The goal of Project Sonar, which also includes the University of Michigan, is for researchers to share their data, help educate vendors whose products are discovered via the scans, and, ultimately, to raise public awareness of the vulnerability of this Internet-facing equipment.
The more [who] are involved, the easier it will be to do research in the future, says Moore, who is also the creator of Metasploit. It doesnt make sense to stop this kind of work. We need to know whats out there.
But Moore says progress in fixing vulnerable Internet devices accessible via these open-systems scanners has been frustrating. The depressing thing from my point of view is we identify vulnerabilities and shiny new bugs ... But things get worse in the infrastructure, he says. He says the state of security in Universal Plug and Play (UPnP) devices remains poor. Moore revealed earlier this year that his scans had uncovered 40 to 50 million networked devices
in harms way via flaws in the pervasive UPnP protocol
, which is enabled by default in most printers, routers, network-attached storage, IP cameras, media players, smart TVs, and even video game consoles.
The situation isnt much better for Internet-facing servers and workstations, which Moore and researcher Dan Farmer earlier this year found were vulnerable to
major flaws in the Intelligent Platform Management Interface (IPMI) protocol and the Baseboard Management Controllers (BMC) packaged with most servers
for remote management purposes.
The underlying theme with many of these and other exposed devices on the public-facing Internet is default backdoor-type access by the vendors for internal ease of access and use, including default passwords, as well as customers either unaware or not understanding the looming dangers of the holes sitting exposed on the Internet.
Getting Abuse For Helping
One of the biggest challenges faced by Moore and other researchers who conduct Internet scanning research is the abuse complaints waged against them. People dont like being scanned and complain to our ISP. Most people cant scan the Internet because their ISP would quickly just cancel their account rather than put up with the abuse complaints. In many ways, this is a good thing because thats how they shut down hackers and viruses, but it has the side effect of shutting down good white-hat research like this, says Robert Graham, CEO at Errata Security, who has built his own open-source tool for the task called Masscan.
Project Sonar is expected to attract more security researchers into scanning the Net for vulnerable equipment as well. White-hat researchers have been secretive about their scans in the past. Now they can come out of the closet about it, Graham says.
Moore says Project Sonar should help provide a more unified and official front for this type of research going forward. There is safety and power in numbers, he says. And having security companies, universities, and other respected organizations behind it will help the image of this type of research, which is often misunderstood, Moore says.
Vendors with exposed products also will benefit, he says, with data on their market share as well as inventory of some of their older equipment, for instance, he says. They may not realize that the IPS product they shipped six years ago is still being sold out there, for example, Moore says.
The University of Michigan, which recently released Zmap, a tool that can survey the entire IPv4 Internet space in less than an hour, will host Project Sonars data.
[A network scanner designed from scratch by three University of Michigan researchers can scan the entire IPv4 Internet in about 45 minutes, drastically reducing the speed at which such scans can be accomplished. See
Fast Scanning To Fuel Golden Age Of Global Flaw Finding
.]
Rapid7 Labs believes the only way to make meaningful progress is through data sharing and collaboration across the security community as a whole. As a result, we launched Project Sonar at DerbyCon 3.0 and urged the community to get involved with the research and analysis effort. To make this easier, we highlighted various free tools and shared a huge amount of our own research data for analysis,
blogged
security researcher Mark Schloesser, who also included information on the open-source tools for scanning as well as best practices.
Errata Securitys Graham, meanwhile, says he hopes the community model will encourage white-hat research of Internet-facing vulnerabilities to keep this research alive. So far weve been extremely open about our scans, blogging about them, announcing them, disclosing summaries of the results, adding people to our exclude list, and so forth, Graham said in an email interview. But in the future, we may have to go to the dark side -- by which I mean the same dodgy ISPs that spammers, scammers, and hackers use. Wed still be open about it, of course -- its just that the source will appear less legitimate.
Among the big takeaways from his Masscan port scans is that exposed home routers and access points are rampant, Graham says. My message to home users is this: That device you bought to connect you to the Internet? I give it a 70 percent chance I can hack it -- easily. Sure, some are secure, its just that most arent. And more expensive or feature-rich or secure devices from more reputable vendors are no different in this respect than any other vendor/device, he says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Researchers Unite To #ScanAllTheThings