A security consultant is developing a search engine called NKill that aims to track the security vulnerabilities on every computer connected to the Internet, with the ability for users to search for vulnerable computers in a country or inside a specific company.NKill, which currently covers all .com, .org and .net domain names, will be made available to the public within one month or so, said Anthony Zboralski, founder of Bellua Asia-Pacific, speaking Wednesday at the Hack In The Box Security Conference in Dubai. Compiling a record of all of the vulnerabilities on every computer requires a TCP port scan of the entire Internet, a process that can take between eight and 16 hours using a 100M bps connection, Zboralski said. These scans return detailed information, called banners, that include the version numbers of operating systems and applications that are running on each computer or server. While this information allows researchers to determine what vulnerabilities the computers have, it doesn't tell them who owns the computer. "The main problem with scanning the Internet is that you end up with a bunch of IP addresses, but if you want to know if one of your customers is using one of these addresses it's really difficult," Zboralski said. "We could scan the entire Internet, but we didn't know which companies were vulnerable." NKill solves this problem by matching IP addresses with domain names and the companies that use them. The database currently includes 102 million domain names and is updated daily. Users can search the database for computers with a specific vulnerability or search by company to identify vulnerabilities that affect its computers. The database also tracks how vulnerabilities change over time, giving users a way to see how companies patch and maintain their systems over time or compare the level of computer security between different companies, Zboralski said. Down the road, Zboralski hopes to make NKill an open-source project and plans to add more features, such as an iPhone application for mobile access and an API (application programming interface) that allows NKill to be integrated with other tools. He's also looking for a way to integrate whois data with NKill that would allow researchers to have a more detailed picture of all of the domains operated by a company or government. "It would also be cool to show where the machines are using Google Maps," he said, adding that he's looking for volunteers to help out with the project.
Most Popular Reviews
- 1 Huawei P9 review: lifting photography to another level... sometimes.
- 2 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 3 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Best Deals on PC World
Latest News Articles
- Microsoft appears to be building a business app marketplace
- Sony Xperia X Performance review: Sony’s most disappointing product in years
- Box Shuttle makes it easier to ditch on-prem file storage
- Facebook wins appeal over tracking non-members in Belgium
- Terror-suspect database used by banks, governments, has been leaked
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCLinux Systems AdministratorQLD
- CCTechnology and Security ArchitectACT
- CCIT Business AnalystNSW
- CCRuby on Rails DeveloperNSW
- FTSenior Java Developer (Java/Maven/AEM)NSW
- CCBusiness AnalystVIC
- FTDatabase DeveloperACT
- FTBusiness Analyst - Oracle Financials (Procure To Pay)NSW
- CCService Desk ConsultantVIC
- FTTechnical Business Analyst (Integration background)NSW
- FTEnvironments Lead (Linux/ Automation)VIC
- FTSolution ArchitectVIC
- CCBusiness Analyst - TravelNSW
- CCProgrammer (IT Security/Website Administration) 160711/P/565Asia
- FTSystems application support analystNSW
- CCMiddleware Developer - BaselineACT
- CCSenior Solutions Architect - Marketing and Distribution systemsNSW
- CCSystems Engineer / Applications Scripting DeveloperSA
- CCBusiness Analyst - BPRNSW
- CCAnalyst Programmer (J2EE/ SQL*PLUS/PL/SQL/PRO*C) 160617/AP/983Asia
- FTIT Project ManagerAsia
- CCSenior Systems AnalystACT
- CCAnalyst Programmer (System Backup Operation/UNIX) 160615/AP/791Asia
- CCSharePoint DeveloperSA
- CCContract IT Assistant (IT Security/IT Audit) 160621/ITA/361Asia