Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Dirty stinking router cesspit !

Comments

  • Closed Accounts Posts: 1,322 ✭✭✭dbit


    Oh and a while back i was on about lizard squad and the possibilty of using home routers as DDOS platform.

    http://krebsonsecurity.com/2015/01/lizard-stresser-runs-on-hacked-home-routers/

    Seems i was on the right track . ( PAts self on back) .


  • Closed Accounts Posts: 720 ✭✭✭anvilfour


    dbit wrote: »

    Ouch!

    Would putting Tomato/dd-wrt on your router help? Presumably not if they can flash the firmware again?


  • Closed Accounts Posts: 1,322 ✭✭✭dbit


    Well the malware attacks that are starting to become more prevalent in that they attack routers from infected pc's to query default username and password is bad enough , but some of these vulns are just a complete mindFook as they can gain access to vulnerable models via a myriad of open windows and doors. Protocols that should be punched in the face , then look at us , not to name a certain isp who thinks firmware upgrades are just a frilly name on a pair of knickers. ( Some of the darknessCom routers around irleand are up to 20 FW updates behind - and more)

    Changing the default router usr and pass is one step (For internal malware attack at least) but how to you circumvent vulns on routers that are so far behind current updates ?

    That list above is for up to date routers in some cases . Home routers have been built upon Frogs n snails n puppy dogs tails.


  • Closed Accounts Posts: 720 ✭✭✭anvilfour


    dbit wrote: »
    Well the malware attacks that are starting to become more prevalent in that they attack routers from infected pc's to query default username and password is bad enough , but some of these vulns are just a complete mindFook as they can gain access to vulnerable models via a myriad of open windows and doors. Protocols that should be punched in the face , then look at us , not to name a certain isp who thinks firmware upgrades are just a frilly name on a pair of knickers. ( Some of the darknessCom routers around irleand are up to 20 FW updates behind - and more)

    Changing the default router usr and pass is one step (For internal malware attack at least) but how to you circumvent vulns on routers that are so far behind current updates ?

    That list above is for up to date routers in some cases . Home routers have been built upon Frogs n snails n puppy dogs tails.

    We're doomed! I really can't think of a way round this unless you build your own... I think Raspberry PI can be made into router?


  • Closed Accounts Posts: 1,322 ✭✭✭dbit


    anvilfour wrote: »
    We're doomed! I really can't think of a way round this unless you build your own... I think Raspberry PI can be made into router?

    Pfsense I'm sure can run on a pi I think. Least back when I built one for load balancing wan connections um sure I saw a pi effort. USB LANs though and through puts and performance wouldn't be great from a pi with a few users and multimedia home .


  • Advertisement
Advertisement