«
Expand/Collapse
125 items tagged "router"
Related tags:
cnc [+],
xavi [+],
sagem [+],
password [+],
lan [+],
cross [+],
chaos communication congress [+],
Wireless [+],
wireless router [+],
site [+],
openwrt [+],
cross site scripting [+],
comtrend [+],
xss [+],
exploitation [+],
denial [+],
wpa [+],
tp link [+],
telnet authentication [+],
system [+],
network [+],
mercurycom [+],
linksys wrt54g [+],
lan routers [+],
juniper [+],
hackaday [+],
felix fietkau [+],
fast [+],
cnc router [+],
Newbie [+],
Area [+],
wifi [+],
type [+],
txt [+],
thomson hardware [+],
support password [+],
stkeygen [+],
shell script [+],
router firewall [+],
root support [+],
root [+],
pppoe [+],
penetration testers [+],
password retrieval [+],
password disclosure [+],
manager [+],
mace [+],
link dir [+],
lindner [+],
iso version [+],
infrastructure [+],
http headers [+],
homehub [+],
hash [+],
g wireless [+],
free software updates [+],
floppyfw [+],
firewall capabilities [+],
firewall [+],
felix [+],
direct access [+],
code execution [+],
classic [+],
cisco security advisory [+],
cisco security [+],
cisco ios software [+],
cisco ios [+],
cisco [+],
c01 [+],
belkin [+],
attacker [+],
alpha networks [+],
adsl router [+],
access [+],
Software [+],
Hardware [+],
workspace [+],
video [+],
vectors [+],
usr [+],
using a router [+],
user [+],
tool [+],
tl wr [+],
thomson [+],
shapeoko [+],
security [+],
repair [+],
presentation [+],
ping tool [+],
o brien [+],
netgear [+],
n router [+],
multiple systems [+],
multiple [+],
modem [+],
misc [+],
mikrotik router [+],
mikrotik [+],
mac [+],
linux [+],
link tl wr [+],
ipv [+],
interface [+],
infrastructure devices [+],
implementations [+],
icmpv [+],
having fun [+],
google [+],
gateway [+],
evasion [+],
dlink di 604 [+],
dlink [+],
cisco event [+],
bus [+],
bugtraq [+],
blackhat [+],
announcement [+],
andrew [+],
advertisement [+],
hacks [+],
zte zxdsl [+],
x y [+],
wrt [+],
worms [+],
work experience placement [+],
work [+],
will ignore [+],
wi fi [+],
wgr [+],
wep [+],
webapps [+],
vulnerabilities [+],
video router [+],
video feedback [+],
victim machine [+],
usa [+],
unwanted guests [+],
unbricking [+],
tutorial [+],
ttl lines [+],
toy [+],
tool paths [+],
tom [+],
thumb drive [+],
three dollars [+],
thompson [+],
thanks in advance [+],
terminal node controller [+],
terminal [+],
tank [+],
taikson [+],
table [+],
swiss army knife [+],
stepdown converter [+],
station [+],
springfield missouri [+],
springfield [+],
source mac [+],
source [+],
something [+],
slides [+],
sink [+],
siggraph [+],
serial [+],
security flaws [+],
scott [+],
scanner [+],
routers [+],
router table [+],
router project [+],
router models [+],
router issues [+],
rooting [+],
root shell [+],
rock [+],
robot [+],
rick [+],
retrofitted [+],
replay attack [+],
rename [+],
remote controlled helicopter [+],
remote control helicopter [+],
read [+],
public ip [+],
power brick [+],
porta 80 [+],
poc [+],
plasma cutter [+],
pid [+],
peripherals [+],
perfect circle [+],
pc case [+],
passphrase [+],
paper [+],
palm device [+],
palm [+],
pain in the butt [+],
p.s [+],
opendns [+],
open source tool [+],
office [+],
node [+],
nicolas fischbach [+],
netgear wgr614 wireless router [+],
netgear wgr614 [+],
nathan [+],
my own [+],
mount ram [+],
modem wireless [+],
modem router [+],
missouri [+],
mike calvino [+],
microcontrollers [+],
mechanical engineer [+],
max [+],
mameing [+],
mame [+],
malware [+],
mail kontakt [+],
mach3 [+],
mac filter [+],
mac adresse [+],
mac address filtering [+],
lotus domino [+],
lotus [+],
lofty goals [+],
linux based [+],
links [+],
lightidra [+],
lhost [+],
largest [+],
kevin bong [+],
jig [+],
james [+],
irc router [+],
irc [+],
ios [+],
internet gateway [+],
internet card [+],
internet [+],
internal ip address [+],
information [+],
ilan [+],
hydra [+],
hsdpa [+],
home [+],
helicopter [+],
heli [+],
height [+],
heat sink [+],
heat [+],
header fields [+],
hacking [+],
hackers [+],
google translation [+],
gerhard bertelsmann [+],
gantry [+],
g laptop [+],
forensics [+],
fonera [+],
fischbach [+],
fios [+],
finger painting [+],
finger [+],
fiber optics [+],
extreme [+],
exploits [+],
everything [+],
espresso machine [+],
entertainment value [+],
email server [+],
ebay [+],
easter egg [+],
dsl router [+],
dsl [+],
dongles [+],
domino smtp [+],
doing projects [+],
dns [+],
dlinkdi [+],
disclosure [+],
dedicated systems [+],
ddos [+],
dd wrt [+],
day forum [+],
day [+],
data packets [+],
d link router [+],
creativity [+],
craig heffner [+],
cpu clock [+],
cpu [+],
converter chip [+],
controller. this [+],
connecting [+],
collecting dust [+],
cisco fixes [+],
circle [+],
chumby [+],
chris kantarjiev [+],
choos [+],
charging station [+],
cellphones [+],
cavity [+],
cat condo [+],
case [+],
can [+],
call [+],
business hub [+],
bus 160 [+],
bunnie [+],
building a pc [+],
bruteforce attack [+],
bridge [+],
bootloader [+],
bonafide [+],
belkin router [+],
axis router [+],
axis cnc router [+],
authentication [+],
audio router [+],
audio [+],
asus [+],
arp requests [+],
arduinos [+],
arduino [+],
arbitrary user [+],
aprs tracker [+],
aprs [+],
amateur radio operators [+],
amateur radio enthusiast [+],
alec [+],
aircrack [+],
adresse [+],
administrative interface [+],
Support [+],
Howto [+],
Hackerspaces [+],
General [+],
Ecke [+],
BackTrack [+],
Anfnger [+],
12 inch ruler [+],
vulnerability [+],
service vulnerability [+],
denial of service [+],
adsl [+],
forgery [+],
d link [+]
-
-
9:01
»
Hack a Day
We once enlisted a contractor to cut a plywood circle for a cat condo we were building. Now we’re embarrassed that we couldn’t come up with a solution as eloquent and easy to use as this circle cutting router jig which [Grays42] built. He’s using a small trim router for the job. The jig is [...]
-
-
16:00
»
SecuriTeam
TP-LINK TL-WR841N router is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
-
-
15:44
»
Packet Storm Security Recent Files
This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.
-
15:44
»
Packet Storm Security Misc. Files
This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.
-
-
16:00
»
SecuriTeam
TP-LINK TL-WR841N router is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data.
-
7:29
»
Hack a Day
While wandering around the aisles of his local electronics store this Westinghouse USB charging station caught [James'] eye. He sized it up and realized it would make the perfect enclosure for a small WiFi router. And so began his project to turn a TP-Link TL-WR703N into a DIY Pwn Plug. The basic idea is to include [...]
-
-
17:00
»
SecuriTeam
Xavi 7968 ADSL Router is prone to cross-site scripting, HTML-injection and cross-site request forgery vulnerabilities.
-
-
6:00
»
Hack a Day
Hackaday alumni [Will O'Brien] sent in a few projects he’s been working on lately while he’s in the process of upgrading his workspace. He’s building a 1200 x 1200 mm CNC router based on the Shapeoko router, and it sure looks like he’s having fun doing it. The Shapeoko router is based on the Makerslide open source [...]
-
6:00
»
Hack a Day
Hackaday alumni [Will O'Brien] sent in a few projects he’s been working on lately while he’s in the process of upgrading his workspace. He’s building a 1200 x 1200 mm CNC router based on the Shapeoko router, and it sure looks like he’s having fun doing it. The Shapeoko router is based on the Makerslide open source [...]
-
-
12:47
»
SecDocs
Authors:
Felix Fietkau Tags:
router Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: OpenWrt is a Linux distribution for embedded Wireless LAN routers. In this lecture I'm going to introduce OpenWrt and show you how you can use and customize it for your own projects. OpenWrt is basically a complete Linux distribution designed to work within the space constraints of average wireless routers like the Linksys WRT54G or the ASUS WL-500g. Since April 2005 the build system has been completely rewritten to support a large repository of packages that are built automatically and to make it easy to port it to other router platforms in the future. That makes it useful for creating custom solutions involving wireless networking, like a Hotspot service complete with authentication and billing or a small Voice over IP server (with Asterisk). I'd like to present the structure of the OpenWrt base system and show you how you can create your own packages and firmware images with the tools that we provide (Image Builder, SDK and the build system itself).
-
12:47
»
SecDocs
Authors:
Felix Fietkau Tags:
router Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: OpenWrt is a Linux distribution for embedded Wireless LAN routers. In this lecture I'm going to introduce OpenWrt and show you how you can use and customize it for your own projects. OpenWrt is basically a complete Linux distribution designed to work within the space constraints of average wireless routers like the Linksys WRT54G or the ASUS WL-500g. Since April 2005 the build system has been completely rewritten to support a large repository of packages that are built automatically and to make it easy to port it to other router platforms in the future. That makes it useful for creating custom solutions involving wireless networking, like a Hotspot service complete with authentication and billing or a small Voice over IP server (with Asterisk). I'd like to present the structure of the OpenWrt base system and show you how you can create your own packages and firmware images with the tools that we provide (Image Builder, SDK and the build system itself).
-
12:47
»
SecDocs
Authors:
Felix Fietkau Tags:
router Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: OpenWrt is a Linux distribution for embedded Wireless LAN routers. In this lecture I'm going to introduce OpenWrt and show you how you can use and customize it for your own projects. OpenWrt is basically a complete Linux distribution designed to work within the space constraints of average wireless routers like the Linksys WRT54G or the ASUS WL-500g. Since April 2005 the build system has been completely rewritten to support a large repository of packages that are built automatically and to make it easy to port it to other router platforms in the future. That makes it useful for creating custom solutions involving wireless networking, like a Hotspot service complete with authentication and billing or a small Voice over IP server (with Asterisk). I'd like to present the structure of the OpenWrt base system and show you how you can create your own packages and firmware images with the tools that we provide (Image Builder, SDK and the build system itself).
-
-
21:38
»
SecDocs
Authors:
Felix Fietkau Tags:
router Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: OpenWrt is a Linux distribution for embedded Wireless LAN routers. In this lecture I'm going to introduce OpenWrt and show you how you can use and customize it for your own projects. OpenWrt is basically a complete Linux distribution designed to work within the space constraints of average wireless routers like the Linksys WRT54G or the ASUS WL-500g. Since April 2005 the build system has been completely rewritten to support a large repository of packages that are built automatically and to make it easy to port it to other router platforms in the future. That makes it useful for creating custom solutions involving wireless networking, like a Hotspot service complete with authentication and billing or a small Voice over IP server (with Asterisk). I'd like to present the structure of the OpenWrt base system and show you how you can create your own packages and firmware images with the tools that we provide (Image Builder, SDK and the build system itself).
-
-
12:01
»
Hack a Day
The guys over at Section9 Hackerspace in Springfield, Missouri just finished building this treaded robot. Despite the juxtaposition of the cat, it really doesn’t defend anything. The project is a reconnaissance robot controlled over the network with video feedback. The team started off with some lofty goals. They wanted to the robot to be able to [...]
-
-
15:37
»
Packet Storm Security Exploits
Alpha Networks ADSL2/2+ Wireless Router version ASL-26555 suffers from a remote administration password disclosure vulnerability. Tested on firmware version 2.0.0.30B_ES.
-
15:37
»
Packet Storm Security Recent Files
Alpha Networks ADSL2/2+ Wireless Router version ASL-26555 suffers from a remote administration password disclosure vulnerability. Tested on firmware version 2.0.0.30B_ES.
-
15:37
»
Packet Storm Security Misc. Files
Alpha Networks ADSL2/2+ Wireless Router version ASL-26555 suffers from a remote administration password disclosure vulnerability. Tested on firmware version 2.0.0.30B_ES.
-
-
10:00
»
Hack a Day
Fresh from this year’s SIGGRAPH is a very interesting take on the traditional X Y-table based CNC machine from [Alec], [Ilan] and [Frédo] at MIT. They created a computer-controlled CNC router that is theoretically unlimited in size. Instead of a gantry, this router uses a human to move the tool over the work piece and only makes [...]
-
-
7:20
»
SecDocs
Tags:
router Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in their infancy and are still not even used in most penetration tests. This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary. While the overall flow of systematically attacking a network's infrastructure is similar to attacking any network -- recon, find vulnerable points, gather data, harvest authentication credentials, attack, recurse -- there are several useful vectors still not common among network engineers or penetration testers. This talk will outline some useful lateral techniques for backbone and infrastructure device hacking, as well as discussing how to assess a network and develop your own attacks if there are no known ones to be found.
-
7:15
»
SecDocs
Tags:
router Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in their infancy and are still not even used in most penetration tests. This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary. While the overall flow of systematically attacking a network's infrastructure is similar to attacking any network -- recon, find vulnerable points, gather data, harvest authentication credentials, attack, recurse -- there are several useful vectors still not common among network engineers or penetration testers. This talk will outline some useful lateral techniques for backbone and infrastructure device hacking, as well as discussing how to assess a network and develop your own attacks if there are no known ones to be found.
-
7:14
»
SecDocs
Tags:
router Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in their infancy and are still not even used in most penetration tests. This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary. While the overall flow of systematically attacking a network's infrastructure is similar to attacking any network -- recon, find vulnerable points, gather data, harvest authentication credentials, attack, recurse -- there are several useful vectors still not common among network engineers or penetration testers. This talk will outline some useful lateral techniques for backbone and infrastructure device hacking, as well as discussing how to assess a network and develop your own attacks if there are no known ones to be found.
-
-
7:01
»
Hack a Day
Like many hackers of late, [Rick] has been experimenting with connecting Arduinos to the Internet with a disused WiFi router and an installation of OpenWRT. Unlike his fellow makers, [Rick] thought it would be wasteful to dedicate a single router to one Arduino project, so he used a small, low power wireless module to connect [...]
-
-
11:01
»
Hack a Day
This setup is used to control a model railroad. Well, not entirely this setup. [Gerhard Bertelsmann] already has a proper railroad controller, and it just happens to offer CAN bus communications. He’s using OpenWRT and a cheap router to connect the bus to the network. Originally he wanted to use a Raspberry Pi board [...]
-
-
10:01
»
Hack a Day
Last Christmas, [bonafide] received a WiFi enabled remote control helicopter from his employer. The heli is an interesting bit of kit, able to be controlled with an Android or iDevice. Being the good tinkerer he is, [bonafide] took a screwdriver to his Wi-Fli Bladerunner Helicopter and reengineered the toy to use an off-the-shelf wireless router. [...]
-
-
12:01
»
Hack a Day
If you’re going to make your next project wireless, you don’t need an XBee, WiFi shield, or even a Bluetooth module. Turning old hardware into a dev board is extremely easy, as [Taikson] shows us by adding an I2C bus to a Fonera router. (Spanish, here’s the Google translation) To add an I2C bus, [Taikson] [...]
-
-
21:46
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco IOS Software contains a denial of service (DoS) vulnerability in the Wide Area Application Services (WAAS) Express feature that could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Cisco IOS Software also contains a DoS vulnerability in the Measurement, Aggregation, and Correlation Engine (MACE) feature that could allow an unauthenticated, remote attacker to cause the router to reload. An attacker could exploit these vulnerabilities by sending transit traffic through a router configured with WAAS Express or MACE. Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Repeated exploits could allow a sustained DoS condition. Cisco has released free software updates that address these vulnerabilities.
-
21:46
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco IOS Software contains a denial of service (DoS) vulnerability in the Wide Area Application Services (WAAS) Express feature that could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Cisco IOS Software also contains a DoS vulnerability in the Measurement, Aggregation, and Correlation Engine (MACE) feature that could allow an unauthenticated, remote attacker to cause the router to reload. An attacker could exploit these vulnerabilities by sending transit traffic through a router configured with WAAS Express or MACE. Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Repeated exploits could allow a sustained DoS condition. Cisco has released free software updates that address these vulnerabilities.
-
21:46
»
Packet Storm Security Misc. Files
Cisco Security Advisory - Cisco IOS Software contains a denial of service (DoS) vulnerability in the Wide Area Application Services (WAAS) Express feature that could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Cisco IOS Software also contains a DoS vulnerability in the Measurement, Aggregation, and Correlation Engine (MACE) feature that could allow an unauthenticated, remote attacker to cause the router to reload. An attacker could exploit these vulnerabilities by sending transit traffic through a router configured with WAAS Express or MACE. Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Repeated exploits could allow a sustained DoS condition. Cisco has released free software updates that address these vulnerabilities.
-
-
18:22
»
Packet Storm Security Recent Files
STKeyGen demonstrates how default WPA keys and default Administrator passwords are created on BT HomeHub 2 Type A router in the UK which are based on Technicolor/Thomson hardware.
-
18:22
»
Packet Storm Security Tools
STKeyGen demonstrates how default WPA keys and default Administrator passwords are created on BT HomeHub 2 Type A router in the UK which are based on Technicolor/Thomson hardware.
-
18:22
»
Packet Storm Security Misc. Files
STKeyGen demonstrates how default WPA keys and default Administrator passwords are created on BT HomeHub 2 Type A router in the UK which are based on Technicolor/Thomson hardware.
-
-
18:50
»
Packet Storm Security Exploits
Mercurycom MR804 Router version 3.8.1 Build 101220 Rel.53006nB suffers from a denial of service vulnerability when fed multiple HTTP headers.
-
18:50
»
Packet Storm Security Misc. Files
Mercurycom MR804 Router version 3.8.1 Build 101220 Rel.53006nB suffers from a denial of service vulnerability when fed multiple HTTP headers.
-
-
10:01
»
Hack a Day
Open source engraving [Scott] wanted to do some v-carving with a CNC router, but couldn’t find software to generate GCode that didn’t cost hundreds of dollars. He ended up doing the sensible thing and wrote his own that will generate tool paths from CXF fonts. We’ll be bookmarking this for when our router project is done. Improving [...]
-
-
13:56
»
Hack a Day
Twenty three dollars. That’s all this tiny pen-testing device will set you back. And there really isn’t much to it. [Kevin Bong] came up with the idea to use a Wifi router as a bridge to test a wired network’s security remotely. He grabbed a TP-Link TL-WR703N router, a low-profile thumb drive, and a cellphone backup [...]
-
-
13:50
»
Hack a Day
[Ed] is pretty old school. He loves the functionality of old industrial shop tools that have their own dedicated systems. With huge candy-like buttons, who wouldn’t? [Ed] decided to replicate this aesthetic by building a MAME controller for his Mach3 controlled router. [Ed] had a bunch of MAME buttons and joysticks sitting around from a forgotten [...]
-
-
13:59
»
Hack a Day
Most of the time, CNC machines are used for very precise and exacting. There is another way that allows for a more “hands on” approach to routers and mills that allows for a lot more creativity and freedom. The touchCNC these guys whipped up allows anyone to finger paint with a friggin router. From the forum [...]
-
-
15:35
»
Hack a Day
[Heli] had a WRT300N wireless router sitting around collecting dust. He decided to squeeze at bit more entertainment value out of it by seeing if he could pull off a RAM upgrade. He managed to double the router’s RAM and posted a walk through (translated) to help you do the same. Swapping out surface mount RAM [...]
-
-
10:01
»
Hack a Day
[Andrew] has an ASUS wl520-gU router that he is pretty fond of, despite its numerous problems. CPU clock bug aside, the router only has 16MB or memory like many others on the market. While tooling around with the bootloader he bricked the device, so he decided it was time for an overhaul. After some searching [...]
-
-
4:01
»
SecDocs
Authors:
Craig Heffner Tags:
router Event:
Black Hat USA 2010 Abstract: This talk will demonstrate how many consumer routers can be exploited via DNS rebinding to gain interactive access to the router's internal-facing administrative interface. Unlike other DNS rebinding techniques, this attack does not require prior knowledge of the target router or the router's configuration settings such as make, model, internal IP address, host name, etc, and does not rely on any anti-DNS pinning techniques, thus circumventing existing DNS rebinding protections. A tool release will accompany the presentation that completely automates the described attack and allows an external attacker to browse the Web-based interface of a victim's router in real time, just as if the attacker were sitting on the victim's LAN. This can be used to exploit vulnerabilities in the router, or to simply log in with the router's default credentials. A live demonstration will show how to pop a remote root shell on Verizon FIOS routers (ActionTec MI424-WR). Confirmed affected routers include models manufactured by Linksys, Belkin, ActionTec, Thompson, Asus and Dell, as well as those running third-party firmware such as OpenWRT, DD-WRT and PFSense.
-
-
11:02
»
Hack a Day
[Tom] sent in a gigantic 3-axis router that he pieced together during a 2 week-long work experience placement. Looking at this picture showing a 12-inch ruler on the work area, we realized that this may be the largest CNC router we’ve seen on Hack A Day. [Tom]‘s employer gave him some obsolete axes, so piecing [...]
-
-
4:02
»
Hack a Day
As with most writers for [HAD], I enjoy doing projects as much as I like writing about them. As a mechanical Engineer that writes for a blog mostly about electronics, a CNC router seemed like something I needed in my garage. Building a router like this requires a bit of expertise in both electronics and [...]
-
-
3:46
»
Hack a Day
[Nathan] had an small router kicking around and thought that he might as well put it to good use. He had always been interested in getting a better handle on his espresso machine, and figured that the router would be a perfect Linux-based PID controller. He installed OpenWRT on the router, then disassembled it in [...]
-
-
10:12
»
Hack a Day
[Arto] recently upgraded his home Internet subscription from an ADSL to VDSL, and with that change received a shiny new ZTE ZXDSL 931WII modem/wireless router. Once he had it installed, he started to go about his normal routine of changing the administrator password, setting up port forwarding, and configuring the wireless security settings…or at least [...]
-
8:13
»
Hack a Day
[Chris Kantarjiev] is an amateur radio enthusiast (call sign K6DBG) and does a lot with the APRS. We think his build, turning a WRT54gl router into an APRS gateway will be very useful for the APRS tracker builds we’ve been covering. Setting up an Internet Gateway, or igate, on APRS usually requires a ‘real’ computer. [...]
-
-
0:03
»
Packet Storm Security Recent Files
The IPv6 Router Advertisement Guard (RA-Guard) mechanism is commonly employed to mitigate attack vectors based on forged ICMPv6 Router Advertisement messages. Many existing IPv6 deployments rely on RA-Guard as the first line of defense against the aforementioned attack vectors. This document describes possible ways in which current RA- Guard implementations can be circumvented, and discusses possible mitigations.
-
0:03
»
Packet Storm Security Misc. Files
The IPv6 Router Advertisement Guard (RA-Guard) mechanism is commonly employed to mitigate attack vectors based on forged ICMPv6 Router Advertisement messages. Many existing IPv6 deployments rely on RA-Guard as the first line of defense against the aforementioned attack vectors. This document describes possible ways in which current RA- Guard implementations can be circumvented, and discusses possible mitigations.
-
-
12:01
»
Hack a Day
Adjusting the bit height on a router table can be a pain in the butt. Traditionally you needed to get into the cavity under the table top in order to make these adjustments, and it’s hard to make the adjustment and measure the height at the same time. Modern routers now offer the option to [...]
-
-
9:29
»
Packet Storm Security Advisories
An ICMPv6 router announcement flooding denial of service vulnerability affects multiple systems including Cisco, Juniper, Microsoft, and FreeBSD. Cisco has addressed the issue but Microsoft has decided to ignore it.
-
9:29
»
Packet Storm Security Recent Files
An ICMPv6 router announcement flooding denial of service vulnerability affects multiple systems including Cisco, Juniper, Microsoft, and FreeBSD. Cisco has addressed the issue but Microsoft has decided to ignore it.
-
-
9:01
»
Hack a Day
[Reinventing Science] needed a project that he could use to test out his skills on a new CNC routing machine he recently acquire. He settled on building a PC case using easily obtained materials. What he ended up with is the clean-looking case seen above that was machined from materials you can pick up at [...]
-
-
12:01
»
Hack a Day
Hack-a-Day forum member [Necromant] was recently working on a router when he made a terrible mistake. He connected the wrong power brick to the router, causing a 2.5v over-voltage. The router itself was just fine, as it contained a good stepdown converter, but the HSDPA modem connected to the router’s USB port was not so [...]
-
-
14:08
»
Hack a Day
This 5-axis CNC router could soon be an open source tool. [Mike Calvino] built it for the School of Architecture at the University of Arkansas. It can be used as a router or as a plasma cutter/welder. Now he’s trying to raise some money that will underwrite his time and effort to develop and release instructions, design [...]
-
8:19
»
Packet Storm Security Exploits
Comtrend ADSL router BTC (VivaCom) CT-5367 C01_R12 suffers from a cross site request forgery vulnerability that allows for password changes. Successful exploitation allows remote root access to the device.
-
8:19
»
Packet Storm Security Recent Files
Comtrend ADSL router BTC (VivaCom) CT-5367 C01_R12 suffers from a cross site request forgery vulnerability that allows for password changes. Successful exploitation allows remote root access to the device.
-
8:19
»
Packet Storm Security Misc. Files
Comtrend ADSL router BTC (VivaCom) CT-5367 C01_R12 suffers from a cross site request forgery vulnerability that allows for password changes. Successful exploitation allows remote root access to the device.
-
-
13:24
»
Packet Storm Security Recent Files
Floppyfw is a router and firewall in one image. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy. This is the iso version.
-
13:24
»
Packet Storm Security Tools
Floppyfw is a router and firewall in one image. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy. This is the iso version.
-
13:24
»
Packet Storm Security Misc. Files
Floppyfw is a router and firewall in one image. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy. This is the iso version.
-
-
10:00
»
Hack a Day
[Andrew] used a DSL router to make his own Terminal Node Controller. This will become part of an APRS-IS network, an Internet-based network built by amateur radio operators. The router used here is a Dlink DSL-502T with an AVR based TNC module attached to the serial port header. The phone line connector and its accompanying [...]
-
-
12:56
»
Hack a Day
[Michu] used his old Palm IIIc to make a serial interface for his OpenWRT router. It’s a matter of cracking open both the router and the Palm device, then connecting the TTL lines from the router to the MAX 3386e level converter chip inside the Palm. From there, Pocketterm can connect to the router’s serial [...]
-
-
10:00
»
Hack a Day
We’ve noticed that wireless routers pump out a bunch of heat. [Jernej Kranjec] wanted to make sure that he didn’t fry it once he started adding more load to his router using OpenWRT. What he came up with is the idea of using an old CPU as a passive heat sink. He applied a bit [...]
-
-
8:00
»
Hack a Day
[bunnie] has taken a few moments to show us how to turn our Chumby One into a 3g router. As it turns out, there is an easter egg that allows it to communicate with certain models of 3g dongles. There’s no GUI for this trick, so you’ll be doing most of your configuration via SSH. [...]
-
-
5:56
»
remote-exploit & backtrack
Dear All
i have a N150 netgear router and i am trying to break the wep code on it.
i have logged into it to apply the following settings:
enc:wep 64bit
key:1B9DDA483D
i have tried the usual packet injection method using aireplay to break into my bt business hub with no issue however when i do the same for the netgear the number of data packets captured does not go above 255!
i do not know why this is!
any ideas
cheers
-
-
8:52
»
remote-exploit & backtrack
Hi Fellaz,
I've successfully exploited various win xp machines on my lan in lab environment using SET and aurora exploit but that is locally, how can these exploitz be used against other side of router on MY remote office pcs (ie.) want to try and pentest outside the local lan, will the exploit meterpreter session come back to me on my LHOST 192.168.0.8 address even if not on the same lan. if not how can it be acheived?
Pentest office : attack machine ip 192.168.0.8 public ip 96.xx.xx.xx
Remote office different lan: victim ip 192.168.1.9 public ip 92.xx.xx.xx
MY OWN btw victim machine both owned my myself.
both ip addresses differ 92.xx.xx.xx and 96.xx.xx.xx so how to metasploit past my remote router into the lan side.
As stated I own both networks but not Pwnd yet.
Googled and not found a thing apart from changing LHOST to public ip but thats just the router isnt it?
Kind Regardz DEE
-
-
9:52
»
remote-exploit & backtrack
Hallo zusammen,
ich habe folgendes Probelem:
kurz gesagt: ich schaffe es nicht per browser auf einen Router zuzugreifen.
Jetzt etwas ausführlicher:
Ich habe mir letztens einen Router auf ebay gekauft (5,8 incl. VSK;)), um ein bisschen mit der WLAN-Verschlüsselung rumzuspielen und diese zu knacken. Jedoch bin ich soweit noch nicht gekommen, da dieses deaktiviert ist und ich nicht per browser auf das Konfigurationsmenü zugreifen kann. Das habe ich mit mehreren Browsern unter verschiedenen Windows und Linux und vom Laptop und Desktop-PC aus probiert.
Es handelt sich um einen Allnet 1681. Leider bietet er keine Reset-Funktion, um die Werkseinstellungen wiederherzustellen.
Die Verbindung richte ich also per Lan ein, DHCP funktioniert nicht, ich bergebe also manuell eine Adresse. Die gewählte Adresse stimmt mit dem vom Handbuch empfohlenen Adressraum überein. Ich kann den Router auch erfolgreich anpingen. Außerdem funktioniert er problemlos als 4-Port-Switch (oder Hub, das hab ich nicht näher untersucht)
Ich vermute jetzt, dass ein MAC-Filter aktiviert ist, doch wie kann ich herausfinden, ob das tatsächlich der Fall ist?
Welche Möglichkeiten, außer dass das Gerät defekt ist, gibt es noch, die den Zugang blockieren könnten?
Der E-mail Kontakt mit dem Privatverkäufer hat ergeben, dass dieser keine Ahnung von Technik hat und das Gerät nie selbst benutzt hat, was ich aber auch wegen der Artikelbeschreibung vermutet habe. Sollte wirklich ein MAC-Filter aktiv sein, habe ich vor eine passende MAC-Adresse mit einem Brute Force Angriff herauszufinden. Ich hab dazu auch schon ein paar interessante Sachen gefunden, aber erstmal will ich herausfinden, ob das ganze überhaupt Erfolg haben kann (Also wirklich ein MAC-Filter den Zugang blockiert).
Mit nmap (ohne Parameter) habe ich keine offenen Ports finden können, aber vielleicht ist das auch der völlig falsche Weg;).
Ich würde mich also sehr um hilfreiche Tips freuen.
MfG g3rax
-
0:00
»
remote-exploit & backtrack
Ok,.. So I got a pickle here and wanted to know if anyone ran into this,..
Went with verizon fios and they have there own routers cause I am amusing fiber optics? For giggles I tried to crack the new router at my house and it won't let me inject into it.. Works fine for my linksys one but for some reason there router seems to be a something new. There is something also new, you know it tells you the speed of the connection? like 54(Mps)? Well it says 54e.
Wait did some research,.. is this a case if mac address filtering? if so how do I adapt?
Also does that e mean that there is in fact mac address filtering going on?
-
-
12:38
»
remote-exploit & backtrack
Hey guys, I am using a wireless internet card to connect to my linksys router. However my router uses a WPA shared key to connect to it. And in backtrack 4 the only options are a passphrase and a preshared key for the wicd manager. Does anyone have any ides or directions on how to connect to the router using WPA shared key? I know I could just change the security on my router to WEP or something less secure, however my family does not want me to because that would involve changing the setting on every other device etc. etc. thanks for your help :) Hope to see a reply soon :)
-
5:36
»
remote-exploit & backtrack
Ciao amici
vi faccio vedere un semplice attacco verso un router usando Hydra , questo avviene tramite console non GUI.
* apri la console e scrivi:
# hydra -l "admin" - P wordlist.txt -vV -s 80 -f 192.168.1.1 http-get /
Spiegazione:
la ( -l ) rappresenta (admin) la grande parte dei router hanno Admin come username, per essere sicuri google la marca del tuo router.
la ( -P ) e' per il password list ( se la tua password list ha un nome diverso, cambia Wordlist.txt con la tua)
la ( -vV ) fa' vedere il login e password ad ogni prova. in piu
usa un modo insistente .
la ( -s ) rappresenta la porta da attaccare, i routers comunicono tramite porta 80.
la ( -f ) serve a Hydra di finire il lavoro appena ha trovato la combinazione.
la ( / ) finale non sono sicuro ma durante i test che ho fatto dovevo metterla per forza.
*** Se la password si trova nel tuo passlist, Hydra all fine ti dara' la combinazione : User + Password.
Buon Divertimento
GD
-
-
1:08
»
remote-exploit & backtrack
Ok,
I have recently signed up with a new ISP [Sky] and they do not allow 3rd party routers. This would not be an issue if the router they supplied had a greater range than just one room :(.
My proposal is to create my wireless network using my existing hardware connect the old router to the new router via LAN.
New router has the following settings:
ip = 192.168.0.1
DNS = 208.67.222.222 [OpenDNS seems more reliable than their Supplied DNS]
Plan is to have old router on same ip subset. eg make it be 192.168.0.10 with a gateway of the new router.
This setup works.
Now i have disabled DHCP so that each PC/Device has to be manually configured.
My question is this:
If i shifted the new routers ip to 192.168.0.[anything but 1] and setup old router and my devices with this gateway. How long would it take to discover on average the gateway? I know wireshark has a gateway detection tool, is there anything else i need to be wary of?
I know this is my home network and i am probably over thinking here, but if i can hide the gateway from detection easily then surely thats another reason to deter unwanted guests on my network.
For info i am still finding my feet with BT4Final so if the tool is included i may need pointing to it.
I have posted this inthe newbie thread as i am sure that this will have you guys slapping forehead and shouting thats easy - do this.
Thanks in advance
-
-
13:13
»
remote-exploit & backtrack
Hey there everyone, first off I'd like to thank all the great people at BT who made this swiss army knife of tools possible! You Rock!
So here is the problem. I'm using a BT4 final live cd and Aircrack on my router. I try to inject but I cannot for the life of me get some IV's!! Here's some information about my setup and things I've tried:
- I have an Acer 4736G Laptop (dunno if that helps)
- It has an intel 5100 AGN Wifi card, that uses the iwlagn drivers in BT4
- My router is a Dlink DIR-600
- Injection test is working fine (or so it says)
- I've attempted to do arp replay attack but I got 54 ARP's after 20 mins and 130K packets sent and no deAuth packets
- I tried to the the chopchop attack from Xploitz video I saw here, but it says the fragmentation failed.
question, is my wifi card just not compatible? Or, am I doing something wrong? Any tips you'd like to suggest?
Thanks in advance to anyone who responds!
P.S: I initially posted this on someone else's thread in the wireless section, but when I checked my email it says n00bs can only post in the newbies section for the first 3 days. Sorry if this is considered a duplicate post :(
-
-
17:47
»
remote-exploit & backtrack
So I came across a 4 minute video on youtube on how to penetrate my own router. I have a Belkin router and I was able to do everything the fella in the video has done.
I use VMWare to run BT4. I type out everything he does but with my own info obviously. And this is what I see afterwards...
Notice: got a deauth/disassoc packet. Is the source MAC associated ?
Read 676863 packets (got 1 ARP requests and 19928 ACKs), sent 623247 packets...(499 pps)
I know nothing of what I am doing. It just looked easy and I happen to have a USB adapter. But whatever I am doing I had fun.
thanks