One of the scariest things I have found on the internet is the sheer number of NAS drives which are not password protected.

I have recently compiled a CSV of over 11,000 hosts which have NAS drives that are insecure publicly accessible. To test that my data was valid, I have connected to some of the hosts and verified this myself.

Some may say ‘Oh so you have downloaded the contents of their drives’. I haven’t. I can categorically state that none of their information was downloaded to my servers. The process I took was to use the utilities within linux to mount a cifs (smbfs) share, and do a recursive directory listing, and then unmount.

The most scariest thing I have found out of all of this is one person’s NAS drive had their entire windows profile, and within it, there was an excel spreadsheet named ‘banking login details.xls’, ‘driving lisense.jpg’ (the spelling is exact), and ‘passport.jpg’. So, any slightly more nefarious visitors with a darker hat than mine could be inclined to take these files, and suddenly have two forms of identification and access to their internet banking.

Since I am a nice person, I am developing a script which will iterate through all the hosts I have identified as being vulnerable and adding a ‘PLEASE SECURE YOUR STORAGE.txt’ file within every share (perhaps every folder on every share) with details of this article, and perhaps some suggestion of a donation for my niceness.

As for the CSV, its safe. Its encrypted with my gpg key, so nobody can get to it.