Feeds

Napster alternative: hack people's hard drives

'ShareSniffer' blurs line between hacking and P2P sharing

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

With the future of music-swapping site Napster looking grim, on Friday a tiny Nashville-based startup began touting an even more controversial milieu for peer-to-peer file sharing: random, unprotected hard drives on the Internet.

ShareSniffer's newly-launched software, itself called ShareSniffer, allows people to hunt for exposed Windows file systems with the ease of a Napster-user searching for a favorite track. "Right now... there are tens of thousands of computers worldwide that have their files deliberately shared with the Internet with no password required," reads the ShareSniffer Web site. The site goes on to encourage Netizens to rummage through strangers' music files, digital movies, Microsoft Word documents and spreadsheets.

The company motto: "Because it's there."

Microsoft Windows' NetBIOS support makes it easy to share hard drives and printers over a network. But users who configure their home or office network for file sharing often inadvertently make their files accessible from the Internet as well. If such a user hasn't chosen a file sharing password, then their disk drives are open to anyone who knows their system's Internet (IP) address.

These so-called "open shares" are one of the Internet's most persistent security issues. The problem made the SANS Institute's list of top ten security holes in 2000, and has been the subject of warnings from the government-funded Computer Emergency Response Team (CERT), and the FBI's National Infrastructure Protection Center (NIPC). The vulnerability is a favorite among computer intruders and virus writers: last year even saw a malicious worm that spread through open shares, seized victims' modems and dialed 911.

ShareSniffer Inc. appears to be the first enterprise to try to harvest open shares for commercial gain. The three-person company offers the software as a free download, but plans to offer more full-featured versions for between $5 and $100.

A program that scans Internet addresses for unprotected disk drives might be viewed as a hacking tool. But to the man who wrote it, ShareSniffer is an honest peer-to-peer venture that brings out the full potential of Windows' networking features.

"I want people to know that they don't have to take the time to make a web site and pay somebody to host it," says ShareSniffer Inc. co-founder Kerry Rogers, 40, the author of the program. "All they have to do is right-click on a folder, and they can make all their music and art and other incredible stuff available to the world."

Legal Issues

Others see it differently. "Federal law makes it illegal to knowingly obtain unauthorized access to a computer," says Mark Rasch, a former federal computer crime prosecutor, now an attorney with the Science Applications International Corporation (SAIC).

"The person who has, through no knowledge of his own, left file sharing 'on' with no protection, that is the electronic equivalent of leaving your door unlocked," says Rasch. "You can't with any degree of certainly say it is an invitation to enter....Therefore, when you enter through an open file share, that's likely an unauthorized access."

"We have a bevy of lawyers that say just the opposite," Rogers claims. Rogers also points out that ShareSniffer only locates open shares, it doesn't access them. The user does that through a normal Windows function.

Programs that scan for open shares are already available online -- as hacking and security auditing tools. What distinguishes ShareSniffer is the user interface, which has all the trappings, icons and trademark touches you'd expect from a serious P2P commercial software package. A user selects a block of Internet addresses and clicks on an icon to set the program's scanning engines, or "nostrils," into action. ShareSniffer eventually returns a list of addresses with open shares.

The program automatically posts its bounty of unprotected systems to a particular Usenet news group, where other ShareSniffer clients can pick it up and display it. "It's distributed computing -- everyone is getting the benefits of everyone else's sniffing," explains Rogers. As a side effect, the ShareSniffer news group has quickly become an open repository of unprotected systems. Monday morning, thirty Internet addresses were listed.

In a Usenet posting, Rogers predicted that number will "soon easily exceed 2000 per day," and will increase ten-fold in the months to come.

Rogers maintains that those open shares are not accidents or security holes: people share files deliberately, he says, particularly on college campuses, where students use open shares to swap music and software with one another. "I want to emphasize that this is public and voluntary," says Rogers. "Microsoft Windows by default will not expose files to the Internet. It has to be consciously configured to expose files to the Internet."

But Patrick Prokop, a TV weatherman in Savannah, Georgia, says he never intended to open his home computer to the world. Nevertheless, a ShareSniffer client sniffed out Prokop's machine earlier this month, apparently in pre-launch testing by the company, and the address was posted on Usenet. On Friday, anyone could read, modify, or delete files on Prokop's system.

"I don't like that idea," said Prokop, after SecurityFocus notified him that his computer was accessible. Prokop says he meant to share files between two computers on a home network, and didn't realize they were accessible to everyone else. "I'll have to password protect them, or put a firewall up."

Asked about Prokop's system, Rogers acknowledged that ShareSniffer may expose unintentional file shares. "We're seeing stuff on the Usenet group that we don't necessarily want to see," he admits, but he claims that will become rare when ShareSniffer catches on. "People will realize that they're going to be exposed."

© 2001 SecurityFocus.com, all rights reserved.

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.