Play With Routers, & Node Ennumeration

This article describes how I was able to find linksys routers open to vulnerability. If you have a Linksys router make sure you have taken the proper steps to securing yourself. There is a follow up to this article here

I scanned a rather large portion of IP's (2 class C IP ranges). If you don't know what port scanning is click here. There are several important things you should know before I go further. This is a violation of most ISP's "acceptable usage policy." For that reason, I targeted the end consumers NOT corporate or commercial connections. Now, if your going to port scan a large range of IP address I suggest that you specify only the ports you need. Don't scan every port because it will take FOREVER! In my case, I scanned for the following ports:

  1. 21:      FTP
  2. 22:      SSH (usually a *nix system or some kind of server)
  3. 23:      Telnet
  4. 80:      HTTP
  5. 8080:  Alternate HTTP (some ISP's block port 80, by default some routers will run on 8080)
  6. 3389:  RDP (Microsoft remote desktop connections run on this port)
I used a program called Networkview. It's pretty simple looking but it gets the job done.




Router Report
Notice the node with the box around it. It has a different icon than most of the other nodes. This indicates that one or more of the ports I specified is open on that node. Based on what port it was I could make a pretty darn good guess as to what was running on that machine. Here are my complete results based on 3 IP's reported:


Port # Open Identity Password
21 26 FTP sites Some anonymous with WAREZ
22 3 A few Red hat servers All had non-standard passwords
23 15 Some Cisco devices and high end routers or modems All had non-standard passwords
80 0 This port was blocked by the ISP N/A
8080 24 Mostly routers or personal web servers Almost half Linksys routers with default login
3389 9 A few Windows 2000 servers, mostly XP Pro 1 with a guest account active over RDP

I gained access to these routers using the standard login credentials (admin:admin). This combination is used as the router leaves the factory. It is up to the user to change the password manually. This is why so many of these routers are still using the default credentials. As the results show, nearly half of the routers running with web-management enabled were using the default login credentials

Upon Successful login, I had to option to change the password, change the client connection rules, and even re-direct traffic. A hacker could setup the router to leave a specific machine completely open to the outside network

In conclusion, I suggest that anyone using a router to share their broadband connection change the router password, and ensure web-management is not enabled. Make sure your router has the latest firmware installed.

sorry I do not put up a web termimanl router, I have a problem connection



 


Category Article

One Response to “c0decstuff”

What's on Your Mind...

Thank f' u C0mment