Vulnerabilities / Threats
9/30/2013
11:32 AM
Connect Directly
RSS
E-Mail
50%
50%

Project Sonar Crowdsources A Better Bug Killer

Scans of the entire Internet for known vulnerabilities turn up terabytes of data, but the next steps won’t be easy.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Can the vulnerabilities present in every public-facing network be recorded, identified and ultimately eradicated? That's the goal of Project Sonar, which was officially launched at the recent DerbyCon 3.0 conference in Louisville, Ky., which wrapped Sunday.

Project Sonar is the brainchild of HD Moore, who is chief research officer at Rapid7, as well as the creator and chief architect behind the Metasploit open-source vulnerability scanning tool, which can be used to test sites for known vulnerabilities. In a similar vein, Moore's latest project is focused on turning data gleaned from Internet-wide scans into actionable information for security professionals, developers and product vendors.

"Project Sonar is a community effort to improve security through the active analysis of public networks," said Moore in a related blog post. "This includes running scans across public Internet-facing systems, organizing the results, and sharing the data with the information security community." In one sense, the project focuses on spotting vulnerabilities not just for individual sites or Web applications -- as Metasploit does -- but in potentially every Internet-connected network.

[ How secure is your new iPhone? Read Apple Hackers Rate iPhone 5s Security. ]

So far, Rapid7 has released about 3 TB of raw data gathered from scans of IPv4 TCP banners and UDP probe replies, IPv4 reverse DNS lookups and IPv4 SSL certificates. It's now inviting other researchers to not just comb through the data, but generate and share their own.

What are the potential upsides of this type of project? For starters, having enormous amounts of information on the real-world vulnerabilities spotted in public-facing networks could help IT managers better prioritize their patch management plans, as well as hold vendors accountable for not just rapidly fixing vulnerabilities, but also ensuring that their customers are using the latest patches.

"Raising awareness about widespread vulnerabilities through large-scale scanning efforts yields better insight into the service landscape on the Internet, and hopefully allows both the community and companies to mitigate risks more efficiently," said Rapid7 security researcher Mark Schloesser in a related blog post.

Still, this remains relatively uncharted territory. Notably, Project Sonar is possible only due to recent big-data advances. "A few years ago, Internet-wide surveys were still deemed unfeasible, or at least too expensive to be worth the effort," said Schloesser, pointing to the need to use either lots of devices for scanning, or else long research periods. For example, the 2006 IPv4 Census conducted by the University of Southern California required four years' worth of data collection. Another effort, dubbed Internet Census 2012, illegally used 420,000 systems infected with the Carna botnet to scan about 660 million IP addresses and test 71 billion ports.

Today, however, purpose-built tools have allowed researchers -- with the right hardware -- to scan the Internet much more quickly. For example, Schloesser said, the ZMap network scanner, which is open source, can catalog every IPv4 address on the Internet in 45 minutes or less. Meanwhile, Errata Security CEO Robert David Graham's Masscan tool, which can generate 25 million packets per second, claims to be able to do the same job in just three minutes. "So this means that technically one can do Internet-wide scans with a single machine -- if the hardware is good enough," said Schloesser.

But scanning -- and Project Sonar -- is more than a technical endeavor. For one thing, port scans are often interpreted as a sign of attack, and the researchers involved in Project Sonar said that even after notifying hosting companies of the research they were undertaking, they frequently got locked out of their accounts.

"Scanning the entire Internet is bad," said Errata Security's Graham, in his Masscan release notes. "For one thing, parts of the Internet react badly to being scanned. For another thing, some sites track scans and add you to a ban list, which will get you firewalled from useful parts of the Internet."

Furthermore, when it comes to extracting useful vulnerability information, scanning the Internet -- or parts thereof -- turns out to be the easy part. "If we try to parse the data sets ourselves, even with a team of 30 people, it would take multiple years just to figure out the vulnerabilities in the data set," Moore told SecurityWeek. "It's ridiculous, really."

"The more time I spend on these scan projects, the more I realize how big the job is," Moore added. "The majority of the work isn't just figuring out the vulnerabilities themselves, but you have to identify all the affected vendors, identify the firmware versions, coordinate the disclosure process."

"It's a ton of backend work," he said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
10/1/2013 | 10:20:45 AM
re: Project Sonar Crowdsources A Better Bug Killer
David, it's not a research project, but the open question is how -- after all of this data has been collected -- the downstream requirements (identifying bugs, notifying vendors of vulnerabilities, directly informing vulnerable sites) can be dealt with. Automation is the obvious answer, but getting there would probably take some time.

As the project publicizes the vulnerabilities it finds, however, that might put pressure on vendors to patch faster, and push for better patch uptake.
David F. Carr
50%
50%
David F. Carr,
User Rank: Apprentice
10/1/2013 | 3:24:59 AM
re: Project Sonar Crowdsources A Better Bug Killer
Assuming this can be made to work, is there any plan to contact individual site owners (in some automated way?) and alert them to vulnerabilities? Or is this strictly a research project?
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.