TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Port scanning /0 using insecure embedded devices

200 pointsby stevebabout 12 years ago

16 comments

epoxyhockeyabout 12 years ago
Ethics discussion aside, it is really cool to hear about a massive project that a single person performed in secret.<p>I see all of these job listings for "big data" projects with hot startups and here is 1 guy generating a billion records in 1 hour, for fun.<p>It kind of reminds me of the MIT students' <i>Stealing Profits from Stock Market Spammers</i> presentation, because they waited 3 years before talking about it. Source: <a href="http://defcon.org/images/defcon-17/dc-17-presentations/defcon-17-grant_jordan-stock_market_spam.pdf" rel="nofollow">http://defcon.org/images/defcon-17/dc-17-presentations/defco...</a> (video is also on the website)
评论 #5408080 未加载
EvanAndersonabout 12 years ago
This is technically interesting and clearly a cool hack, but it leaves a really bad taste in my mouth. It would be one thing to report on the large number of insecure embedded devices attached to the Internet, but it's another thing to actually use other peoples' devices without their permission-- especially at this kind of scale.<p>HD Moore's DerbyCon presentation last year (<a href="http://www.youtube.com/watch?v=b-uPh99whw4" rel="nofollow">http://www.youtube.com/watch?v=b-uPh99whw4</a>) showed that scanning the entire Internet without resorting to using other peoples' devices to perform the scanning is technically feasible and produces good results. The dataset for scanning for even a fairly large set of applications isn't tremendously large.
joostersabout 12 years ago
I wonder how many of the 420,000 machines they ran their code on got screwed up by them?<p>As anyone who's tried to manage a cluster of machines knows, it's a pain to get everything working. Even when you have complete control over the hardware, software and network, distributing code to the cluster and making the cluster send stuff back is difficult. So much can go wrong and it is easy to take out servers with what seems like the most trivial of mistakes.<p>Now try doing this with almost half a million machines, of unknown hardware, already running unknown software, and operating in network conditions that you have no idea about. Do you think they did it perfectly and nothing went wrong?<p>They undoubtedly broke or disrupted many computers and systems here, and they know it. They can write all the weasel-words they like about how <i>nice</i> and <i>kind</i> they were, but I am sure they broke a lot of people's systems (some of them, by their own admission, running important services).
评论 #5397710 未加载
评论 #5397668 未加载
评论 #5397763 未加载
tlrobinsonabout 12 years ago
This is awesome and terrifying.<p>What would happen if (when?) someone with more evil intentions decides they would like a 420,000 device botnet of their own? Or how much damage could one do by shutting off all these devices simultaneously?
评论 #5397158 未加载
评论 #5397999 未加载
agnokapatheticabout 12 years ago
Would be awesome if this was an S3 public dataset (<a href="http://aws.amazon.com/datasets" rel="nofollow">http://aws.amazon.com/datasets</a>)!
pakabout 12 years ago
Isn't this exactly what rtm did in 1988? The only difference is that this worm took pains to behave more nicely.<p>Funny to see that the proportion of relatively unsecure devices on the internet has not gone down since that time.
scotty79about 12 years ago
USA has strangely different usage patterns. Usage decreases in the evening so peek seems to be during work hours.<p>Americans work a lot, I'm sure almost all of that internet use is productive and they just prefer having fun outside after work.
estabout 12 years ago
<a href="http://internetcensus2012.bitbucket.org/images/clientmap_16to9_small.jpg" rel="nofollow">http://internetcensus2012.bitbucket.org/images/clientmap_16t...</a><p>Next time if a Chinese IP hacks you, it a botnet node in China hacked you.
metalrulerabout 12 years ago
This is a way cool idea. Probably not the best thing to happen to the internet on a daily basis, but an amazing project nevertheless.<p>Just waiting for someone to start mining bitcoins on 420,000 slightly underpowered CPUs...<p>(Ok, seriously now.) The traceroute data could be used to build an interesting map of the internet. I'm sure there's lots of cool things that can be done with what has been released.
jbuzbeeabout 12 years ago
Interesting, but let's see. Where have I heard about how the Feds (over)react to gaining unauthorized access to someone else's computer? Hmm...<p><a href="http://www.wired.com/threatlevel/2013/03/att-hacker-gets-3-years/" rel="nofollow">http://www.wired.com/threatlevel/2013/03/att-hacker-gets-3-y...</a>
jervisfmabout 12 years ago
This is some interesting research. I am wondering though: Does anyone know whether there are any potential legal issues with scanning devices / networks that do not belong to you ? Is it possible for you to get into trouble in engaging in this activity?
评论 #5396802 未加载
评论 #5396728 未加载
评论 #5397394 未加载
joostersabout 12 years ago
"We had no interest to interfere with default device operation" ... "After a reboot" ...<p>How does rebooting someone's computer not count as 'interfering'? Let's hope none of those machines were doing anything important.
评论 #5396829 未加载
jstanleyabout 12 years ago
Very awesome. I have some concerns about the legality of this. Has anyone tried to sue you?
nonamegivenabout 12 years ago
Judging from the map it looks like North Korea has managed to protect itself quite nicely.
BoyWizardabout 12 years ago
Uploading and running executable code on other people's devices without their permission is absolutely illegal, regardless if it's exposed or not. I would be <i>pissed</i> if someone did this on any of my devices.
评论 #5397717 未加载
评论 #5398477 未加载
评论 #5399307 未加载
uribsabout 12 years ago
Interesting, maybe we should revoke IPv4 assignations to Apple, Ford, HP, Prudential etc. who aren't using anything close to the 16 million IP addresses they have.
评论 #5397210 未加载
评论 #5398065 未加载
评论 #5397552 未加载
评论 #5398466 未加载