Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Anyone who does pentesting isn't suprised or even interested in this. A few long nights of research and a little knowhow with linux and the wireless world is yours for the taking, if your patient enough.
WPA hasn't been cracked. Very few people use WEP anymore.
That is not entirely true. There have been tools out to crack WPA for quite some time now (especially if using TKIP as opposed to AES). A badly configured router using WPA can be cracked in as little as ten minutes (usually much longer, but still). Also, a very surprisingly large number of home users still use WEP; this should not be the case, but most people don't know the difference and just go with whatever their router defaults to.
And, some of the authenticated attacks were simple CSRF attacks which should absolutely be fixed. OR even simpler csrf-type vulnerabilities like me knowing your router is 192.168.1.1 and sending you a link that goes to http://192.168.1.1/admin/delete_your_whole_face?lol or to a page with a button that does that and it deletes your entire face because you had an active router session in another tab.
I always think of Crisco when I see Cisco.
Yeah i'm aware of WPA1 being vulnerable if using TKIP but when it comes to WPA AES or WPA2 there's nothing. I just don't think someone with pentesting and "Linux experience" has the "wireless world for the taking" as he put it.
http://www.ubnt.com/unifi
It's not a router, but an access point, but given they are testing the wireless this is probably more relevant than the actual router. (pfsense in my case).
DDWRT, and configure your router propety; no worries .
Not on the list??? Your router just wasn't tested.
I still see some DD-WRT stuff running root/admin passwords....
I use pfSense now. Password would be a bit difficult to guess. I'm sure with enough brute force, though, it could be done. Just like most other passwords.
I do plan on going with a Cisco router sometime, though. I'm already running a nice Cisco Gb switch (3560E) and need a good router to go with it.
No password should be easily guessable these days, especially a network pass. Mine is over 25 characters long and a mix numbers, letters, and symbols. Just pick a quote or a line from a poem and mix in some 1337 and you're good to go. Long ass complicated password + its real easy to remember. Brute force proof.
Nothing is completely safe. Sure, it may take a long time (especially when you lock it out after x attempts), but it's not impossible.
Mine is something like this: Mg5#2mcT (not even close to what it is, but you get the idea). So, I guess I could write a simple script to start guessing, but it'd still take a while. If they want into my network that bad, go for it. There is really nothing that is that special, anyway. If you want a copy of my porn folder, give me a 500 GB HDD and I'll copy it for you.
I guess if I had mission critical stuff, I'd secure it a bit more, but for a home user with very little stuff on my network (sure, taxes and stuff, but that's nothing huge), I'm fine.
So basically its an ~8 character password with random letters/numbers/symbols. IE its short and hard to memorize. Really the most secure thing about it is the fact that it has a password in the first place and it blends in with other networks, ie security by obscurity. But it must be annoying to have to write it down, so here lets do you a favor.
Ur_Mom's_New_Passw0rd_Ownz!
There you go, much more secure and easy to remember
So, the number within my password is incremented rather than a whole new password. It's not the best way to do it, but otherwise I'd write it down....
Funny, my home router isn't on that list...I wonder why..
Cisco 892-W..
http://www.ubnt.com/unifi
It's not a router, but an access point, but given they are testing the wireless this is probably more relevant than the actual router. (pfsense in my case).
Haha, I have the same basic setup as you. 2 UniFi Pro WAPs and pfSense. I ditched my Cisco/Linksys combo a LONG time ago.
If it is correct in what i saw on the linksys page with proof of concept they have to do this :
So if you don't go browsing on webpages that are designed to hack your router there is no worry .
How do I know which webpage on the WWW is designed to hack your router. Every link send to you by email which you have no clue about but sounds like it is legit And yes that goes for links through any IM as well . Those have been known to do the same thing even if it is a close friend sending you such a link.
I do plan on going with a Cisco router sometime, though. I'm already running a nice Cisco Gb switch (3560E) and need a good router to go with it.
For what I can tell, this article is stupid. Just like others have mentioned, the perp needs my log in info. Which in my case is not the default login/password. I changed that minutes after setting it up.
Yeah i'm aware of WPA1 being vulnerable if using TKIP but when it comes to WPA AES or WPA2 there's nothing. I just don't think someone with pentesting and "Linux experience" has the "wireless world for the taking" as he put it.
http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
http://www.csoonline.com/article/73...ssword-encryption-in-its-ios-operating-system
Even Cisco does stupid things sometimes. Cliffs: A flaw they introduced in a new encryption algorithm makes that version suspectable to brute force attacks. They considered it a non issue until customers started to complain.
Same here! RT-N56U is quite awesome with Padavan's firmware.
it's vulnerable. If someone wants in and has the time they can break in. Knowing a tiny bit about the password or what the login contains can vastly reduce the time.
for instance most wpa2 ISP modems/routers are crackable within a few hours.
if you have the right equipment you over power the device with a stronger radio and capture a handshake and bruteforce that.
Means he wants to over power you by turning the volume up on his radio and brute force a hand shake out of you, lol.Why would you need to "overpower the device with a stronger radio"? That doesn't even make sense and leads me to believe you're speaking BS.
In simple terms, all you need to do is to click an ad link on tab 1 just to see what kinds of deals you may get and Bam, your router got hijacked and you didn't even know it, it is what the problem is.
No problem...lol...all one has to do is update their browser, then all is right with the world again.