SlideShare a Scribd company logo
1 of 31
A Tale of a Rogue Router
Firmware
</Authors>
➔
Bijay Limbu Senihang
(CEH/CISSP)
➔
Co-Founder/Information
Security Consultant of
Entrust Solutions Nepal
➔
Trainer/Lecturer
➔
Loyal Husband
➔
Nabin KC
➔
Pentester/Security
Researcher at Entrust
Solutions Nepal
➔
CVE-2014-8496
➔
Loyal Single
Once Upon a Time...
In Parallel Universe...
Real Attack Scenario
Demo
Hacking a PC behind NAT in 4 minutes ..
Insecure Scenario
The Story of a Discovery...
Its All about Super
Backdoor Demo( no more
admin:admin )
This is not the End...
● More Than 10 Major Vendor Used Same
Firmware(*****)
This is not the End...
 Digicom
 DAPR 150RN
 DAPR 300RN
 Alpha Network
 AIP-W525H
 AWAP806N
 Pro-Link
 PRN3001
 WNR1008
 Planet Networks
 WNRT-300G
 TrendNet
 TEW-638APB
 TEW-639GR
 TWE-736RE
 Realtek
 RTL8181
 RTL8186
 RTL8186P
 Bless
 Zio-3300N
 Zio-4400N
 Zio-3200N
 Zio-3300N
 SmartGate
 SG3300N
 SG3100N
 Blue Link
 BL-R30G
This is not the End...
➢ Case of Copyright Infringement
This is not the End...
➢ Copyright Infringement (Contd..)
This is not the End...
➢ Copyright Infringement (Contd..)
Are they just Copyright
Infringement or really a Rogue?
Lets clear the confusion
● Tried to upload their vendor firmware
A Rouge Router Firmware ;-)
2ook Online Devices+(Unknown number
Offline) Affected Worldwide(approximately)
How it can be used?
 Botnet (used for DdoS attack, APT Attack )
 Personal proxy network aka My personal TOR
 Free Wi-fi Map (I am not Mark Zuckerburg but can help
to make a free Internet world)
Who is Responsible?
➔ Vendor
➔ Government
➔ Consumer
Your Last Defense!!
Your Last Defense!!(Contd..)
 Firewall aka watch guard
Your Last Defense!!(Contd..)
● Anti-virus aka body guard
Your Last Defense!!(Contd..)
● Anti-virus aka body guard
Your Last Defense!!(Contd..)
 User
Moral of the Story
Moral of the Story
● Know your Devices and Vendor
● Creating a hard time for an attacker is a win win
situation. Use as much defense you can.
● A best way to be protect home router is to disable the
Remote Management if you don't need.
● Try Open Source firmware if your device supports(eg.
OpenWrt)
P.S. No router were harm or used for illegal purpose during our research
Responsible Disclosure
Router Vendors have been informed about
this issue. Only TREDNET has replied till
now.
Contact Us
www.ensolnepal.com
Email: info@ensolnepal.com
@bhutabe
@n_cnew
Find presentation here: blog.ensolnepal.com

More Related Content

Similar to A tale of a rouge router firmware

The internet of $h1t
The internet of $h1tThe internet of $h1t
The internet of $h1tAmit Serper
 
Gluster Cloud Night in Tokyo 2013 -- Tips for getting started
Gluster Cloud Night in Tokyo 2013 -- Tips for getting startedGluster Cloud Night in Tokyo 2013 -- Tips for getting started
Gluster Cloud Night in Tokyo 2013 -- Tips for getting startedKeisuke Takahashi
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - RoutersLogicaltrust pl
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
 
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...CODE BLUE
 
Live Transcript Delivery
Live Transcript DeliveryLive Transcript Delivery
Live Transcript DeliveryGrzegorz Kolpuc
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksThreatReel Podcast
 
DevOpSec_DockerNPodMan-20230220.pdf
DevOpSec_DockerNPodMan-20230220.pdfDevOpSec_DockerNPodMan-20230220.pdf
DevOpSec_DockerNPodMan-20230220.pdfkanedafromparis
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...Felipe Prado
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busbyDavid Busby, CISSP
 
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFA Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFoholiab
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillageagmoneyy
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet NoNameCon
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 

Similar to A tale of a rouge router firmware (20)

The internet of $h1t
The internet of $h1tThe internet of $h1t
The internet of $h1t
 
Gluster Cloud Night in Tokyo 2013 -- Tips for getting started
Gluster Cloud Night in Tokyo 2013 -- Tips for getting startedGluster Cloud Night in Tokyo 2013 -- Tips for getting started
Gluster Cloud Night in Tokyo 2013 -- Tips for getting started
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
 
Live Transcript Delivery
Live Transcript DeliveryLive Transcript Delivery
Live Transcript Delivery
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
DevOpSec_DockerNPodMan-20230220.pdf
DevOpSec_DockerNPodMan-20230220.pdfDevOpSec_DockerNPodMan-20230220.pdf
DevOpSec_DockerNPodMan-20230220.pdf
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
 
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFA Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillage
 
Universal Userland
Universal UserlandUniversal Userland
Universal Userland
 
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
 
What is being exposed from IoT Devices
What is being exposed from IoT DevicesWhat is being exposed from IoT Devices
What is being exposed from IoT Devices
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

A tale of a rouge router firmware

Editor's Notes

  1. This presentation revolves around the story of the user router and Internet
  2. Lets begin our story. This is a story between a router and user in the internet world. In this story, the need of user I.e to communicate with the world has been fulfilled by the router. And both are happy together to be a part of Internet There was a time when 1000 rupee had to pay just to use 1 hour interent story had change intert user had increase , number router ap device had increase , the home router sales had increse There more then 5 router in a house ,per flat ,some even had router and internt per room but with it ,there explotaion and vurnablity have increase but sad part is our tolarnet after being attack alsolevel had incread with it .
  3. But in the parallel universe, there is ongoing war between Red Team and Black team. One try to protect is then other try to break , Yesteray Previosuly one of the speaker told that bad guy don&amp;apos;t sleep that may be true as don&amp;apos;t sleep when we do more then enough ...that the best time to attack different security issues had been identified in home router and here nobody seems to be concerned about this issues. CV-2014-8496 is a session hijacking bug to take control over it with score 10/10 but what I seen is most of don&amp;apos;t care The problem of using default credential is already there.
  4. Let me introduce to a real world scnerio of the user attacker and how it is done fist Our pc phone laptop are behind the router while using inernet ,let say you device is online with deflaut credition I mean ,you havenot chage the default passowrd , which in most of the case is admin admin then attacker will login to you router and change the dns to hisperoson dns server . Dns it is a just a advisor which will show you the way to the destation , what really happen is that hacker now have the control over you path . At compare with a metro train which most of had problally travel a lot ,what really happen is that when I change dns mens now I will the one who will be decide where your train goes though it will be showing you the same location address. This means you decide to go to pokhara I can drop you at the dharn saying it is pokhara I know we wiill soon figure it out but what if a unkown person is drop he won&amp;apos;t figure out until its too late , that case happen here in interent world I can know point book.com when you are type facebook.com I know no one will be happy about that . This can be exploit in many way like phising , But here I will show you the worse case .
  5. Most of the time our PC are behind the router with the private ip address not as the server So directly a pc can be attack unless victim click some malware , but what in the care user try to update there software to be secured , It is good habit to frequently update you applications OS l right ets see
  6. Leak you infor u Use ur credital and hire a unploayment gury to chash out money as yestardy,can send mail in you behalf can sealt you documant and idently ,
  7. The poor router has been hacked and also the devices connected to the router were compromised. And now the user is concerned about his router security and changes his default username and password. Recently a group called Lizard squard used a DdoS attack against Sony which was possible due to botnets. And those botnets was created hacking router, the similar way that we demonstrated earlier.
  8. It was the regular day in my office I was using internet doing some offiice work as well research router started to be frequently down , and not resplonding ,lets say frequently botellnet occurred , later dig in the cause of it and found that my other frinend was using namp script for this research Now I need to find solution to solve as I cannot tell not to use namp right , Not possible to tell to drop the soldier gun when you are fighting the war. What are the ither options I do have Then I stared digging for solution and was with some Options wihich are avilabe to try , one was to upgarde the firmware other is to upload some opensource it suppor.t . no did work for me nither vedor have new firmware nor opensource community have a compative firmware for it . So I did had third options is the customized the firmware for the soultion , so I stared reverse engeering the firemware start reading the code , there bad luck or I found somehting in intresting which I had heard in daily news ,it was a backoor
  9. Not a supreman banakphone number But as powerfula as him credentilas It was a hardcoded backdoor super super Really I verfied and it worked , Now let me ask you one things who somebody have wirte this code is really his fault Or it was the fault of a guy who forget to put sticker of Super super along with admin admin as the default one, I guess
  10. After getting the info about the backdoor, we did more research. During our research, We tried to find the similar security issues in other model. In order to find that issue, we did inspection of router header and used that info in shodan search to find the similar model. And surprisingly what we found was that the same issue is presented in the router of other vendors too.
  11. These are the list of affected router models.
  12. If you are asking did I did any photograph as one of the presenter had change the make then let me tell you is that I am not that good with photoshop if not I can provide those image for forencies to him Did you any find there any differnce ? Lets try the other one
  13. Did you notice here? Ya there is a a differce if some one is good at the game find different he /she would have find it already ..
  14. I end this I go on shoing those images this presention can be in just in it let me tell is what diffrernce really was thre was was the compnay logo
  15. I was really confuse and my face was worese them his I f I was picture , Company could have sign and selll each other I don&amp;apos;t Know that .
  16. How to can we find out I stared checking the mac address of the device in public avilabe database and got trslly intresting stuff Prolink router mac address are showas trednet and to many reatail I neaver heard of , Side need next pic of digging I also came to know that many vendor use third partry hardware for the product ,so the above can telll you the 100 truth What other options are there to find out .? Best and easiest way was to try to upload the vedor provide firmware,if it is there product then it should certily accpeted there firmware right, A lot of device don&amp;apos;t accepted it ,This means the device we buy claming to may not be the real with the sticker of compnay they are attached.
  17. At the time of our reasearch, 200k online device were affected. So from this calculation we can say aprroxmiately half million devices(combning offline and online) are affected too.
  18. With this issue arise a question who is responsible and whom should we blame? A vendor, who makes router Or Government who allowed to sell false device Or a Consumer who is not bothered to buy a genuine device
  19. We can something download malware knowiy unkwoing but we still have some defese system right. We have a stleaset few watchgurd who will be chasing those stop ritght Lets see how other think or in this picture There is always a way There are a lot of way to do I won&amp;apos;t be explain here how can we do it becasuse of the time other it can be a seprate talk that but recently one of the cool way I was read is realse in defcon 22 which work in most of the case You can find it online about it if intrested
  20. Every one here know about virustotal If not it a cloud based antivius server where you can upload a any excuatable to check wethere it I malicious or not ,it will check the excuatlbe to 57 major antivirusin the server , give you the result Defult payload genrate with metaploit and 36 antivurs detected ,just 36 I was hoping atlest 50 will as it is opensouce compnay can find how those are created and catch it . Second I caeatd is a powershell shell https revese shell script and do little encoding it really show a powe and dorp detection level to 10 and only few of them are major vedor and other are vendor which name I never heard of Lets try one more time with little more reserche and combine few more techniques I was avable to create a malware with zero dection
  21. User are aware but ,but what they can do is there device are backoor and they do not know about it Recently lenovo laptop is consider dongrading the https encryption , wd ,alot hardrive drive are also conside backdoor.
  22. Better know .what you are buing , don&amp;apos;t use duplicated device preserving you cost . One day it can cost you more then you imagine. Don&amp;apos;t leave you device misconfigure ,if you do show there are a lot of guys ready to do for you but in bad way Thre is a tale creaitng hard time for attacker is a win win suation to Use antivirus they won&amp;apos;t give 100 but can will save from a lot malware l -Better use use mut iple antivirus if you pc resouce can handle of two different countlry as one antivurs can catch the virus of other one other may do the same ,mostly coprate should little concren about it , If everyone here is aware with interal cyberwar going one the you propably already have understan what I had try to say If you device support try go for the opensource firmware they are great (opnwart)