Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

9/1/2010
08:30 AM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Finding Exposed Devices On Your Network

When browsing through SHODAN, it never ceases to amaze me what I can find. How is it that people think it's okay to leave their printers, routers, fiber channel switches, and industrial control systems completely open to the Internet?

When browsing through SHODAN, it never ceases to amaze me what I can find. How is it that people think it's okay to leave their printers, routers, fiber channel switches, and industrial control systems completely open to the Internet?In case you're not sure what SHODAN is, I've mentioned SHODAN a few times in previous articles and blogs like "Gaining A Foothold By Exploiting VxWorks Vulns." It's been referred to as a rainbow table for Internet-accessible computers because it provides a searchable index of service banners retrieved from HTTP, HTTPS, FTP, SSH, and telnet services on the Internet without the need to do any of your own scanning.

When I was looking at the VxWorks vulnerability, I found vulnerable printers, network switches, fiber channel switches, and industrial control systems (or SCADA) equipment through some simple searches that are mentioned in this blog.

So I'm left wondering who thought it was a good idea to put these devices on the Internet without some sort of protection in place. Is there no change management procedures at these organizations where someone should be monitoring what's taking place on the network? Surely someone has to provision the public IP for use for the devices. Why aren't they asking what the IP will be used for and if the device is being locked down?

Sure, you can use SHODAN to check your netblocks for exposed devices that you might not be aware of, but why not be a little more proactive? Isn't proactive security better than reactive security? Or more to the point, wouldn't you rather find out about a new exposed device on you network before an attacker does?

There are a couple ways to go about this. The first is setting up some simple network scans using Nmap. It could be done daily or weekly, but I wouldn't recommend going as long as a month in between scans. Be sure to set up the scans to save the output to the Nmap XML format. Once you have more than one scan, you can use the Ndiff utility to compare the two scans and determine if there are any state changes for hosts, ports, service versions, operating systems, and the output of scripts.

The Nmap route is cheap and easy to implement, but if you have a nice netflow analysis solution like Lancope's StealthWatch, it can be done even easier. All of the netflow monitoring tools I've seen have an alert option that will notify admins when a new host is seen communicating on the network. I've also seen alerts for when a host begins acting as a server for the first time. For example, if a host is on the network and begins accepting and responding to requests on TCP port 443 for the first time, admins will receive an alert.

Security teams are often the last ones to know when new systems are brought online, but they don't have to be. Using the tools above, security can know when new systems show up on the network and take appropriate actions such as a vulnerability scan, and confirm that the device is authorized and not some rogue wireless router an employee decided to plug in so they could use their new iPad.

John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now this is the worst micromanagment I've seen.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17210
PUBLISHED: 2019-07-20
An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass t...
CVE-2019-12934
PUBLISHED: 2019-07-20
An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter.
CVE-2019-9229
PUBLISHED: 2019-07-20
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.251. An internal interface exposed to the link-local address 169.254.254.253 allows attackers in the local network to access multiple quagga VTYs. Attackers can...
CVE-2019-12815
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
CVE-2019-13569
PUBLISHED: 2019-07-19
A SQL injection vulnerability exists in the Icegram Email Subscribers & Newsletters plugin through 4.1.7 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.