21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 3. EXPLORING THE DATASET 35<br />

Figure 3.3: Default user names <strong>and</strong> passwords available in help files<br />

Proportion of connected <strong>and</strong> remotely exploitable nodes<br />

This dissertation is primarily concerned with the scale of industrial system exposure, so<br />

while the anecdotal cases above are interesting, they do not assist underst<strong>and</strong>ing the<br />

scale of the problem. The data shows roughly 7500 nodes exposed online, 17% with<br />

authentication, <strong>and</strong> most without. Primarily this protection is a password, <strong>and</strong> there are<br />

plenty of known techniques for compromising those. If simple attacks such as password<br />

cracking are eliminated from discussion, then 20.5% of the nodes analysed from SHODAN<br />

have published remote exploits for a technology listed in their application or operating<br />

system dependency stack (as derived from a banner).<br />

Top ten Autonomous <strong>System</strong>s<br />

In Table 3.3 the top ten Autonomous <strong>System</strong>s are shown <strong>and</strong> ranked by the number<br />

of devices or systems we found within their allocations. The top ten also conveniently<br />

delineate ASes that contain greater than 100 each. In some cases the AS will have some<br />

responsibility for this state of affairs, but in others they will not. The point of this table<br />

is to show that if one of these ISPs suffer a loss of connectivity, then that has an effect<br />

on the remote management of these systems accordingly.<br />

3.4 Disambiguation <strong>and</strong> false positives<br />

In general false positives (presence of a node in the dataset when it should not be) can<br />

occur when the string we are searching for in SHODAN is replicated in another banner,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!