STE WILLIAMS

Fast Scanning To Fuel “Golden Age” Of Global Flaw Finding

A network scanner designed from scratch by three University of Michigan researchers can scan the entire IPv4 Internet in about 45 minutes, drastically reducing the speed at which such scans can be accomplished.

Announced at last month’s USENIX Security conference, the scanner, dubbed ZMap, uses a modular approach to scanning to speed the process, the pseudo-random selection of IP addresses to avoid overwhelming small networks and validation of the responses to by a separate system to verify the results. The researchers–Zakir Durumeric, Eric Wustrow, and J. Alex Halderman–used the scanner to track protocol use on the Internet, find systems vulnerable to HTTPS weak key flaw, and discovered unadvertised services. Without fast scans of the Internet, many types of research would be infeasible, says Durumeric, a PhD candidate in computer science at the University of Michigan.

“You can imagine that if you did your scans over three months and then did all the followup processing, the Internet could have grown, in terms of the use of certain protocols, by 10 percent,” Durumeric says. “So you have a whole new degree of specificity.”

The techniques combined to create ZMap are not all new, but have not before been brought together in a single program. In the same way that the Shodan service made the results of Internet scans more accessible, the ability to quickly perform customized scans the Internet will likely result in a “golden age” of vulnerability scanning, says HD Moore, chief research officer for Rapid7, a vulnerability management firm. Rather than waiting for days or weeks for scans to complete, researchers can do a lot more with fewer resources.

“It really shrinks the size of the Internet in a way that we couldn’t do before,” Moore says. “It’s not big data anymore.”

Network scanners were originally designed to scan small networks, keeping track of the current state of the scan as it progressed. However, when scanning a network the size of the Internet, the state data can grow too large for most systems, says Durumeric. To solve that problem, some scanning projects have broken up their scans into batches, scanning a complete subnetwork before moving onto the next subnet. Yet, if the scan is done quickly, it can overwhelm the provider with requests.

[Researchers and attackers catalog vulnerable systems connected to the Internet, from videoconferencing systems set to auto-answer, to open point-of-sale servers, to poorly configured database systems. See Global Scans Reveal Internet’s Insecurities In 2012.]

ZMap solves both problems by generating pseudo-random IP addresses using a particular method, known as multiplicative group of integers, so that each address appears only once. The process is broken into a fast engine for generating and sending the packets, and an asynchronous collector that receives the packets and logs the data. The state of each connection is not kept, Durumeric says. Instead, packets are matched by putting identifying data in the unused fields of the network packet.

“Really each of these packets is the same except for where it goes, so we don’t need to go through all these same validation steps,” he says. “We just need to update a small amount of information and send it on to the next host.”

While the three researchers from the University of Michigan have shortened the time it takes to do a scan, there bandwidth required to scan the entire Internet quickly will like limit such project to academic research groups and large corporations.

“When we say we are scanning at a gigabit speed, we are using an entire gigabit connection,” he says. “Most home users have one or two megabytes.”

Rapid7’s HD Moore had already begun working with the University of Michigan on a large-scale study using scans to find Web sites, Internet-connected servers and cloud services that link back to a business’s domain to help companies find unknown or rogue assets. Certificates used with secure services, for example, include the domain of the certificate holder, providing a link that the researchers can connect back to the firm.

“They all point to identifying assets out there that you may not know belongs to your company,” Moore says.

Looking for vulnerabilities is another fertile field. There is no shortage of vulnerable systems out there, says Moore. By using fast scanning to highlight the weaknesses before they can exploited by attackers, the Internet benefits as a whole, he says. Many ISPs distribute poorly configured routers, and Rapid7 and Moore have already highlighted problems in universal plug-and-play (UPNP) devices, such as routers, as well as insecure video conferencing systems.

The net benefit of fast scanning should be that more vulnerabilities will be detected and eliminated, because attackers have already been using botnets and other techniques to scan for vulnerable services in networks. The Carna botnet and the report on its scanning results showed the possibilities of illegal scanning projects. They could adopt ZMap’s techniques for scanning, but will not benefit from the technology as much as defenders, says Moore.

However, eventually the golden age of fast scanning will end. As IPv6 becomes increasingly deployed, scanning the entire network will become impossible. Even limiting scans to known assigned IPv6 addresses and using other information to attempt to identify hosts will not narrow the field much for researchers.

“With IPv6, if it’s not a published entry somewhere, you are not going to find it,” Moore says. “You have to send almost as much traffic to identify a single subnet as the entire IPv4 Internet. So the numbers are not going to work out.”

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/vulnerability/fast-scanning-to-fuel-golden-age-of-glob/240161403

Comments are closed.