Researchers Unite To #ScanAllTheThings
'Project Sonar' community project launched for sharing Internet-scanning data, tools, and analysis
October 1, 2013
HD Moore's Internet-scanning projects are epic: The renowned researcher has exposed major holes in embedded devices, home routers, corporate videoconferencing systems, and other equipment on the public Internet that is open to abuse by bad guys. But even with the groundbreaking findings by Moore and other researchers of these sitting-duck systems, for the most part the devices remain exposed and unfixed.
Moore and his counterparts hope that will change with the help of a newly formed community Internet-scanning initiative called Project Sonar, which was announced this week by Rapid7, where Moore serves as chief research officer. The goal of Project Sonar, which also includes the University of Michigan, is for researchers to share their data, help educate vendors whose products are discovered via the scans, and, ultimately, to raise public awareness of the vulnerability of this Internet-facing equipment.
"The more [who] are involved, the easier it will be to do research in the future," says Moore, who is also the creator of Metasploit. "It doesn't make sense to stop this kind of work. We need to know what's out there."
But Moore says progress in fixing vulnerable Internet devices accessible via these open-systems scanners has been frustrating. "The depressing thing from my point of view is we identify vulnerabilities and shiny new bugs ... But things get worse in the infrastructure," he says. He says the state of security in Universal Plug and Play (UPnP) devices remains poor. Moore revealed earlier this year that his scans had uncovered 40 to 50 million networked devices in harm's way via flaws in the pervasive UPnP protocol, which is enabled by default in most printers, routers, network-attached storage, IP cameras, media players, smart TVs, and even video game consoles.
The situation isn't much better for Internet-facing servers and workstations, which Moore and researcher Dan Farmer earlier this year found were vulnerable to major flaws in the Intelligent Platform Management Interface (IPMI) protocol and the Baseboard Management Controllers (BMC) packaged with most servers for remote management purposes.
The underlying theme with many of these and other exposed devices on the public-facing Internet is default backdoor-type access by the vendors for internal ease of access and use, including default passwords, as well as customers either unaware or not understanding the looming dangers of the holes sitting exposed on the Internet.
Getting 'Abuse' For Helping
One of the biggest challenges faced by Moore and other researchers who conduct Internet scanning research is the abuse complaints waged against them. "People don't like being scanned and complain to our ISP. Most people can't scan the Internet because their ISP would quickly just cancel their account rather than put up with the abuse complaints. In many ways, this is a good thing because that's how they shut down hackers and viruses, but it has the side effect of shutting down good white-hat research like this," says Robert Graham, CEO at Errata Security, who has built his own open-source tool for the task called Masscan.
Project Sonar is expected to attract more security researchers into scanning the Net for vulnerable equipment as well. "White-hat researchers have been secretive about their scans in the past. Now they can come out of the closet about it," Graham says.
Moore says Project Sonar should help provide a more unified and official front for this type of research going forward. "There is safety and power in numbers," he says. And having security companies, universities, and other respected organizations behind it will help the image of this type of research, which is often misunderstood, Moore says.
Vendors with exposed products also will benefit, he says, with data on their market share as well as inventory of some of their older equipment, for instance, he says. "They may not realize that the IPS product they shipped six years ago" is still being sold out there, for example, Moore says.
The University of Michigan, which recently released Zmap, a tool that can survey the entire IPv4 Internet space in less than an hour, will host Project Sonar's data.
[A network scanner designed from scratch by three University of Michigan researchers can scan the entire IPv4 Internet in about 45 minutes, drastically reducing the speed at which such scans can be accomplished. See Fast Scanning To Fuel 'Golden Age' Of Global Flaw Finding.]
"Rapid7 Labs believes the only way to make meaningful progress is through data sharing and collaboration across the security community as a whole. As a result, we launched Project Sonar at DerbyCon 3.0 and urged the community to get involved with the research and analysis effort. To make this easier, we highlighted various free tools and shared a huge amount of our own research data for analysis," blogged security researcher Mark Schloesser, who also included information on the open-source tools for scanning as well as best practices.
Errata Security's Graham, meanwhile, says he hopes the community model will encourage white-hat research of Internet-facing vulnerabilities to keep this research alive. "So far we've been extremely open about our scans, blogging about them, announcing them, disclosing summaries of the results, adding people to our 'exclude' list, and so forth," Graham said in an email interview. "But in the future, we may have to go to the dark side -- by which I mean the same dodgy ISPs that spammers, scammers, and hackers use. We'd still be open about it, of course -- it's just that the source will appear less legitimate."
Among the big takeaways from his Masscan port scans is that exposed home routers and access points are rampant, Graham says. "My message to home users is this: That device you bought to connect you to the Internet? I give it a 70 percent chance I can hack it -- easily. Sure, some are secure, it's just that most aren't. And more expensive or 'feature-rich' or 'secure' devices from more 'reputable' vendors are no different in this respect than any other vendor/device," he says.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author
You May Also Like
Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024