Interesting People mailing list archives
IP: Internet Audit Project
From: Dave Farber <farber () cis upenn edu>
Date: Tue, 17 Aug 1999 06:33:17 -0400
Date: Mon, 16 Aug 1999 22:33:57 -0400 From: Jim Brenton <jbrenton () earthlink net> To: farber () cis upenn edu Dr. Farber, This project and report may be of some interest to IP group, if they haven't already heard about it. We are just starting what I am sure will be a very "robust discussion" of this topic within the CISSP (Certified Information System Security Professional) forum. I will provide significant updates if you desire. Recently the Security Focus Forum published "The Internet Auditing Project" by Liraz Siri (liarz () bigfoot com) as an essay that discussed a project he participated in as a member of a group performing a security scan of most of the Internet hosts. http://www.securityfocus.com/templates/forum_message.html?forum=2&head=32&id=32 As one who works in network security, I had not heard of a project of this magnitude before now. To the best of my knowledge, the audit project report is the first publicly released report that objectively documents the overall state of Internet security (sad at best). The Audit Project report describes how their group scanned over 36 million hosts, and the source code of their scanner, BASS, which is available for download by anyone at: http://www.securityfocus.com/data/tools/network/bass-1.0.7.tar.gz My reason for posting this information is to provide IPers with a glimpse of the technical skills and expertise that some people on the Internet possess. However, these same intelligent people have now made their source code available to every high school student who might want to perform a few independent scans of their own. The forum report clearly demonstrates how much sensitive information can be archived, stored, and retrieved for future exploits against Internet hosts. The group selected parameters on the scan that excluded much of corporate America, but that was just a configuration parameter that could be easily changed. This should be a wake up call. We need to make sure that our network and system administrators have the latest vendor patches installed to preclude 98% of the problems that may be generated by these types of activities. This report is prime example of why everyone should scan their networks externally for potential vulnerabilities and fix them, or someone else will find and exploit those vulnerabilities. This report is circulating on Hacker News Network and other underground BBSs, in addition to the Security Focus Forum. The personal opinions expressed above are my own and neither of my employers, Sprint and Johns Hopkins University, gets any credit or can be held responsible for my absent minded ramblings. Jim Brenton, CISSP Principal Network Security Program Manager Sprint Corporate Security Adjunct Professor, Info and Telecom Systems Johns Hopkins University, School of Professional Studies in Business and Education Here is the group's PRESS RELEASE: PRESS RELEASE - The Internet Auditing Project Aug 13 - SSR, an independent security research group, have recently released a memorandum of the Internet Auditing Project, describing the groups efforts to scan over 36 million (circa Jan 1999) Internet hosts (including it's sensitive military, government and private networks) for commonly known remote security vulnerabilities. The article is written in full-disclosure HOWTO form, supplying the reader with everything he needs to know to repeat the scan on his own (wheels, map and the road), with relatively few resources, including the special-purpose bulk auditing software developed for the project. It offers several unique, interesting insights on the gloomy state of computer security on the Internet, touches on hacker culture, and in-between describes the group's encounter with counterprobes, angry e-mails, threatening lawyers (with relevant legal commentary), a crippling denial of service attack and even an Unidentified Cracking Object (OCO!) which successfully attacked and penetrated [part of] the group's networks with spine-chilling sophistication. The IAP's results? Grim: "... immediately threaten the security [...] of many millions of systems in commercial, academic, government and military organizations ..." And even... "We were stunned to find just how many networks you would expect to be ultra secure were wide open to attack. Banks, billion dollar commerce sites, computer security companies, even nuclear weapon research centers!" It's implications? Grimmer, suggesting an immediate present and future threat to the world's largest and most significant information technology infrastructure. (Holy smoke! So what do we do?!) The article introduces a viable solution, in the form of the "International Digital Defense Network" (IDDN). An ambitious proposal for a public interest project which could dramaticly influence the security of the Internet (for the good!), and resolve many of the most serious problems covered in the article. The article is available as a guest feature (the first) on www.securityfocus.com (the good people hosting Bugtraq) at: http://www.securityfocus.com/templates/forum_message.html?forum=2&head=32&id=32 BASS, the Bulk Auditing Security Scanner developed for the project has also been released and is free for download at: http://www.securityfocus.com/data/tools/network/bass-1.0.7.tar.gz Seek the wisdom.
Current thread:
- IP: Internet Audit Project Dave Farber (Aug 17)