Internet Census 2012, port scanning /0 using insecure embedded devices

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Internet Census 2012, port scanning /0 using insecure embedded devices
Botnet Carna
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 /
Editor/Conference
Link http://census2012.sourceforge.net/paper.html (Archive copy)
Author Carna Botnet
Type Blogpost

Abstract

While playing around with the Nmap Scripting Engine (NSE) we discovered an amazing number of open embedded devices on the Internet. Many of them are based on Linux and allow login to standard BusyBox with empty or default credentials. We used these devices to build a distributed port scanner to scan all IPv4 addresses. These scans include service probes for the most common ports, ICMP ping, reverse DNS and SYN scans. We analyzed some of the data to get an estimation of the IP address usage.

All data gathered during our research is released into the public domain for further study.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1853,
   editor = {},
   author = {Carna Botnet},
   title = {Internet Census 2012, port scanning /0 using insecure embedded devices},
   date = {25},
   month = Apr,
   year = {2013},
   howpublished = {\url{http://census2012.sourceforge.net/paper.html}},
 }