Now you, too can portscan the Internet. Researchers have released a tool that can scan the entire IPv4 address space in under 45 minutes —
from user space on a single computer. All you need is a fast enough pipe and a VERY understanding network admin, as it’s meant to approach the theoretical throughput limit of Gig-E.
No doubt it’s only a matter of time before well-endowed computers get hacked by people who’d like to do a bit of PRISM-style mass computer vulnerability finding. On the other hand, it’s hard *not* to notice someone using this…
Snowden: Looks like JMA may have been right that Snowden tapped the NSA’s internal communications lines… officials are saying they’ve got no logs and no idea how he pulled it off. If JMA can guess it, the latter statement is almost certainly a lie, but the former is plausible. http://rt.com/news/snowden-nsa-safeguards-logs-943/
RF geeks: neat way of using ambient RF to communicate. http://abc.cs.washington.edu/files/comm153-liu.pdf
“ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet.
ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet.”
“Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce ZMap, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine, approaching the theoretical maximum speed of gigabit Ethernet. We present the scanner architecture, experimentally characterize its performance and accuracy, and explore the security implications of high speed Internet-scale network surveys, both offensive and defensive. We also discuss best practices for good Internet citizenship when performing Internet-wide surveys, informed by our own experiences conducting a long-term research survey over the past year.”