Researchers Release Tool That Can Scan the Entire Internet In Under an Hour 97
dstates writes "A team of researchers at the University of Michigan has released Zmap, a tool that allows an ordinary server to scan every address on the Internet in just 45 minutes. This is a task that used to take months, but now is accessible to anyone with a fast internet connection. In their announcement Friday , at the Usenix security conference in Washington they provide interesting examples tracking HTTPS deployment over time, the effects of Hurricane Sandy on Internet infrastructure, but also rapid identification of vulnerable hosts for security exploits. A Washington Post Blog discussing the work shows examples of the rate with which of computers on the Internet have been patched to fix Universal Plug and Play, 'Debian weak key' and 'factorable RSA keys' vulnerabilities. Unfortunately, in each case it takes years to deploy patches and in the case of UPnP devices, they found 2.56 million (16.7 percent) devices on the Internet had not yet upgraded years after the vulnerability had been described."
Re: (Score:2)
As first posts go, that's marvellously creative. Totally unintelligible, but still marvellously creative.
Re: (Score:3)
I think this is the first time I've noticed a post moderated -1, Insightful.
doesn't add up (Score:3, Interesting)
> 2.56 million (16.7 percent) devices on the Internet had not yet upgraded years after the vulnerability had been described."
Something doesn't add up here. Is TFS saying that there are only 15 million devices on the internet? I'm pretty sure the number is bigger than that.
Re: (Score:3)
I'd assume they meant 16.7% of UPnP devices but even then the number seems low.
Re: doesn't add up (Score:1)
No, it's saying there's 15.7 million devices exposing UPNP, out of which 16.7% are vulnerable.
Re: (Score:3)
Re:doesn't add up (Score:5, Informative)
TFS should have just quoted the entire sentence then; from TFA: "Out of 15.7 UPnP devices, they found 2.56 million (16.7 percent) had not yet upgraded."
Re: (Score:1)
But then we are living in a generation that thinks they can really understand complex weather patterns and climatology after watching a two hour (more like 1.4 hours after commercials) TV program that is hosted by someone who doesn't have a hard science degree, Al Gore.
All hail the new age of enlightenment!
Re: (Score:1)
You shut up.
Megalodon is alive today, regardless of what you say.
Re: (Score:2)
As is ManBearPig. Now, get back to discussing the poorly-worded summary, or we're going to have to dress you up as a witch.
Re:doesn't add up (Score:5, Funny)
That's how they're able to scan it all in just 45 minutes, they are using a much smaller internet. Perhaps this tool uses some kind of temporal protocol that allows it to communicate with the internet of 25 years ago.
Re: (Score:2)
of a particular make/model maybe..
Re: (Score:1)
I would expect from the context of the rest of the sentence, that it's 15m devices on the Internet with UPnP.
Re: (Score:1)
good lord let this be command and control for something.
Re: (Score:2)
Burma Shave.
They must mean the IPv4 internet (Score:5, Informative)
Sure, scanning 4 billion addresses in a hour sounds like a lot of data, but conceivable with today's high-speed computers and tech.
But 3.4 x 10^29 billion addresses, as contained in IPv6? Not the same feasibility at all.
Re:They must mean the IPv4 internet (Score:4, Informative)
Re: (Score:2)
No one's stupid enough to only run IPv6, but you will find plenty of dual stack servers - like Comcast's email servers (run dig comcast.net MX to see what I mean).
Re: (Score:1)
Actually, no it's not. With 4 billion addresses: (2^32-1)/60/60 = ~1193046.5 addresses per second. Considering there are only 2^16-1 ports on your system. Of which a few 100s or 1000s are taken by internal handles. I don't see how it's possible on any "ordinary server".
Re: (Score:2)
UDP? A single UDP port on my local box can send UDP packets to any host/port on the internet.
Re: (Score:2)
no they aren't, I can make as many addresses as I want for my machine with certain techniques, and each can have 65K ports
Re: (Score:2)
Re:They must mean the IPv4 internet (Score:5, Informative)
I don't think ports are a limitation. As is common with IPv6, I don't think people appreciate the difference in scale.
The header alone for IPv6 is 40 bytes. IPv6 is 2^128 addresses. 40 * 2^128 / 2^80 = 40 * 2^48 = 11,258,999,068,426,240 YiB (Yobibytes). Just for header data. Even if you use some kind of magic multicasting magic to send the packets, you've still got to get that much header data back. At a transfer speed of 1 Yibps (yebibit per second), it would take 2.8 billion years to transfer all those packets. Then you have to store that data. Just storing every possible IPv6 address as a 128 bit number would take at least 4,503,599,627,370,496 YiB.
Nobody has pipes that fat. Nobody has disks that big.
Compare that to IPv4:
The header is 20-24 bytes. IPv4 is 2^32 addresses. 20 * 2^32 / 2^30 = 80 GiB. That's a completely reasonable amount of data to push in 45 minutes or to store on disk.
Re: (Score:2)
How about if you were scanning for a particular vulnerability and saved only 1 bit per address?
That would be 2^48 / 8 bytes?
2 ^ 48 / 2 = 2 ^ 47
2 ^ 47 / 2 = 2 ^ 46
2 ^ 46 / 2 = 2 ^ 45 = 35TB?
Doable.
(Note I don't know what the / 2 ^ 80 step was all about so this might be waaaaay off)
Re: (Score:2)
There are actually 2^128 possible IPv6 addresses. Ok, then you can cut it down by looking at BGP etc as proposed. But consider that the minimum IPv6 network every user gets is a /64 = every user has 2^64 addresses on his home network, just scanning one single user is not feasible. Not to even think of scanning the entire internet.
You can split an IPv6 address into blocks. The first 32 bits tells you what ISP. This is the part where the BGP trick can help. The next 32 bits is the network number. And the rema
Re: (Score:2)
Router is 192.168.0.1
DHCP devices are
So you can scan the first few addresses, and if you don't get a hit you move on to the next
Re: They must mean the IPv4 internet (Score:3)
DHCP is not used on home routers with ipv6. Your devices pick random addresses using privacy extension and duplicate address detection.
Re: (Score:2)
you aren't thinking fourth dimensionally, Marty.
Suppose, for example, my server had 128 virtual IP addresses its single interface.....
Comment removed (Score:4, Interesting)
Re: (Score:3)
No wonder the NSAs job is so easy.
There's only 34 million https servers in the world!
(not sure what the sarcasm tag is, so yes, this is sarcasm)
Re: (Score:2)
There's only 34 million https servers in the world!
(not sure what the sarcasm tag is, so yes, this is sarcasm)
That might be about right. How many do you think there are?
Re: (Score:2)
Actually, it does seem close. At least according to netcraft. Scroll down to the graph (20M as of Jan2012)
https://ssl.netcraft.com/ssl-sample-report/ [netcraft.com]
Re: (Score:3)
Yes, they only are scanning the IPv4 internet, per page 7 of the PDF linked to in the slashdot article:
Introducing ZMap, an open source tool that can port scan the entire IPv4 address space from just one machine in under 45 minutes with 98% coverage
Uninformed / Inexperienced (Score:2, Interesting)
Pretty sure the problem with UPnP in consumer routers is simply that consumers generally just don't know about the issue. Even if they did know most will have no idea where to start looking to upgrade their devices firmware (if an update is even available). Most consumers walked into the store and the sales rep told them they could connect the to the magic box. The same reason (to this day) that users are running with the default device username/password (admin:admin anyone?) and with the shared key that w
Re: (Score:1)
"the entire Internet" (Score:2)
Oh, do they mean the IPv4 Internet?
tl;dr If you blindly and extremely unneighbourly fire off several packets at every single public IPv4 address in non-sequential order to saturate a fat network pipe, it doesn't take much time to get a lot of shit back.
And of course if you have a not completely crap IDS then anything probing your organisation's entire public space within an hour is going to be detected.
Why are they comparing with nmap? That's not designed for probing the entire Internet.
NSA maps (Score:1)
And between the things people must worry about are cameras [slashdot.org], that are accessible from internet, with present or
Slashdotting the Internet (Score:5, Funny)
I can see it now, a multitude of /.ers downloading, installing then running the program, playing with probe settings to the point where the whole Internet (yes, more then just Web) is brought down by the /. effect
Re: (Score:3)
Re: (Score:3)
Well, it is time for a new Apple product cycle.
Re: (Score:2)
It'd be funnier if everyone just scanned slashdot, and slashdotted slashdot.
Re: (Score:3)
Maybe it will, especially if people have high bandwidth connections. But I suspect most people will be on ADSL or cable.
Now the default zmap syn scan uploads 432 bits (54 bytes) per packet, that's 14 bytes Ethernet frame, 20 bytes IP and 20 bytes TCP. Which means the full 2^32 IPv4 address range needs 1.855 Terabits upload. That's 0.51 hours at 1 Gbit/sec, or 5.15 hours at 100 Mbit/sec, or 51.5 hours at 10 Mbit/sec, or 515 hours (21.5 days) at a more common ADSL uplink of 1 Mbit/sec. Remember the A in ADSL
Re: (Score:2)
Can I trust if if my life doesn't depend on it?
Because it doesn't.
Re: (Score:2)
Something is not what it seems. There is no way one computer can conduct such a scan all by itself, even if all the other devices were on and all had unlimited bandwidth. the response time to a simple ping from each device makes it impossible to scan the entire range in that time span.
No, this has to be a distributed network, and by accessing the software, you are probably agreeing to be part of their slave network.
I wouldn't trust it if my life depended on it.
"Slave network". :D Anyway, it works because you can scan multiple hosts in parallel. You don't have to wait for each one of them to respond (and many of them won't anyway). A simple ping is a small packet and you can fire out them quite fast with a gigabit pipe.
Queue really bad Charter joke. (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
People who say it can't be done should not interrupt those who are doing it.
Re: (Score:3)
Re: (Score:2)
You clearly have no idea what you're talking about.
During grad school, I worked on analyzing the data that my research group had collected during what was at the time the largest web crawl in academia (around 4.6B pages; and mind you, this was an actual crawl, rather than a simple scan, so we were pulling down entire pages) that was gathered over the course of about 40 days, and that was all done from a single server (if memory serves, it was a 2.7GHz Xeon with 16GB RAM, so not all that impressive by today'
scanrand tool was 7 years before (Score:5, Informative)
Please look into "scanrand" software. I used it with nmap combination to scan entire Internet range for under few hours, about 7 YEARS ago.
The Paketto Keiretsu is a collection of tools that use new and unusual
strategies for manipulating TCP/IP networks. scanrand is said to be
faster than nmap and more useful in some scenarios.
.
This package includes:
* scanrand, a very fast port, host, and network trace scanner
* minewt, a user space NAT/MAT (MAC Address Translation) gateway
* linkcat(lc), that provides direct access to the network (Level 2)
* paratrace, a "traceroute"-like tool using existing TCP connections
* phentropy, that plots a large data source onto a 3D matrix
Re:scanrand tool was 7 years before (Score:4, Informative)
re scanrand
http://www.vulnerabilityassessment.co.uk/scanrand.htm [vulnerabil...ment.co.uk] good article, didn't see a date, discuss installation and necessary changes for Fedora Core 1.
dan kaminsky's site for paketto, which includes scanrand; version 1.1 from 2002 has some tools which look interesting
http://dankaminsky.com/?s=paketto [dankaminsky.com]
Re: (Score:2)
Why would you limit yourself to ssh, when there's so many useful unpatched exploits for so many other server applications? Among other things, you're missing out on all the easily exploitable Windows ME boxen out there.
Re: (Score:1)
Why would you limit yourself to ssh, when there's so many useful unpatched exploits for so many other server applications? Among other things, you're missing out on all the easily exploitable Windows ME boxen out there.
ssh defaults to port 22. Port 23 is usually telnet.
1,400,000 PPS!?? (Score:3)
A little overly sensational. PC hardware is no way going to push 1.4M PPS*. I don't know the exact figures but asking a cable/DSL modem to push that many packets seems ludicrous. Good luck "scanning the entire" internet from your PC.
[*] - https://zmap.io/zmap-talk-sec13.pdf [zmap.io]
That's awesome! (Score:2)
Not entire IPv6 space! (Score:1)
Perhaps they can scan the entire IPv4 address space, but certainly not IPv6. IPv6 has more than 7.9×10^28 TIMES as many IP addresses as IPv4.
NAT (Score:2)
I presume this doesn't work with NAT, so the "scan the entire Internet" is a bit misleading. That said, nice job. What would happen of you ran the scanner on a million systems all at once?
Re: (Score:1)
So these must be the clowns ... (Score:2)
... who are behind the machines hosted at umich.edu which have been attacking port 443 on my router with bogus requests and clogging my log files with messages like "peer did not return a certificate".
Go away. Just go away.