Hacker News new | past | comments | ask | show | jobs | submit login
Masscan: The entire internet in 3 minutes (erratasec.com)
80 points by yammesicka on Sept 15, 2013 | hide | past | favorite | 12 comments



I highly recommend watching his C10M video (linked in the article): 'Shmoocon 2013 - C10M Defending The Internet At Scale' - http://www.youtube.com/watch?v=73XNtI0w7jA


How do you deal with the abuse reports? I tried this on a Digital Ocean's droplet against port 80 and sure enough I got reported for abuse in less than 5 minutes after running the script at only 100k rate. It's only port 80!


According to [1] they got 58 abuse complaints for a scan of the entire internet on port 22. The scanner IP address they list is hosted by cari.net who will presumably overlook some abuse reports if you're on their $225-a-month high bandwidth plan.

[1] http://blog.erratasec.com/2013/09/we-scanned-internet-for-po...


First of all, we avoid well-know "darknet" monitors that generate a lot of abuse reports.

Second of all, we response personally to each abuse report and offer to include them in our "exclude" file so that we won't scan them ever again. Though, of course, I prefer they add us to a "whitelist" file: not opening their firewall, but adding us a file that ignore logging.


I can confirm that you will generate abuse reports for any port, including 80 and 443.


Impressive.

Only one thing bugs me: "but I replace 'xor' with a mathematically equivalent 'modulus' operation."

Unless you scan 256,512,768,etc. number of ports there will be bias, and sequence only looks random. I suggest the author to take a look at this:

http://eternallyconfuzzled.com/arts/jsw_art_rand.aspx


I'm not using % on the result of rand().

I'm using the "Feistal network" construction that is at the heart of the data encryption standard, replacing binary operations like 'xor' with the "addition plus modulus" operation.

My found function sucks, and I only do 3 rounds, so there's probably some issues there. But, if I were to fix those issues, then there should be no more detectable bias than in the original DES cipher.


That article still gives a biased answer! Floating point numbers have limited precision, too. http://channel9.msdn.com/Events/GoingNative/2013/rand-Consid...


30 million packets per second from one server, wow.

Pretty terrifying if you subvert it to hit just one network instead of randomly scanning the internet.


What's important about scanning the whole internet in three minutes versus thirty? Actual question, not trying to be snarky.


It's 3 minutes per port. In the real world, you'll want to scan for many ports at a time. If scanning for all ports, it'd take 108 days at this rate.


Ten times the temporal resolution, if you're willing/able to do it.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: