![]() ![]() In this case the end user should not have any sort of device or managment access. As this is Customer PremisesEquipment (CPE) device, only the head end systems should have access. The device had SNMP enabled, with the default read-onlystring set to "public", and it was accessible from the user network segment. I want to identify someof the issues with these embedded routers, and hopefully will prevent future mistakes for vendors andmanufactures. So first lets talk about some of vectors I used to attackthis embedded device : Thus only the head end systems should have access,more specifically the end user should not. This is Customer PremisesEquipment (CPE) device that provides end users with Internet access. Hint: Having root on your hardware is goodfor me, bad for you. In this post, I will flush out in more detailhow one can go about reverse engineering these devices, what tools worked forme, and some of the results that I was able to get to. In the last blog post, "Opps I pwned your router Part One", I talked about some ofpoor security that went into the basic embedded router operating systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |