Digital Doctor
Well-known member
LANCause if it is, I never said it was via wifi. This exploit would be via lan or internet
LANCause if it is, I never said it was via wifi. This exploit would be via lan or internet
Oh definitely. If you can avoid using wireless, you should. But the precautions I mentioned are really for the average home user, obviously if you're in a business environment (or at least, a sensitive environment) then you really need to up your precautions (through things like just using wired, proper subnetting, encrypting all traffic, etc.).Not broadcasting the ssid does nothing really unless you are talking about the cases where people don't change the default password and someone is being a nosey pest as someone who knows what they are doing is going to see your bssid, the channel you use and eventually your essid no matter what you do...and then to a slightly skilled person the MAC filter is useless as well as a couple of pings, a handshake or two and someone can just borrow a whilelisted MAC addy already on your network and then gain access using your passphrase or key which they can get in plain text with relative ease if they have already done any of this.
Either way, even if someone doesn't do any of that...if your router has a vulnerability such as accepting random requests for plain text config files it doesn't really matter what settings you set.
The odd thing is when someones network gets hacked...it is highly probable that the only reason that they were able to gain access to the wireless network in the first place is because the router was communicating with client over air.
Wireless networks are weak sauce in general.
You're good
Just tried it via my IP to my D-Link at the (that I just plugged in to test). No joy... but guess that is due to the fact that I have port 80 routing to my server instead.Then you're lucky not to have one of the affected models.
edit: Wait.... Is that the wifi screen? Cause if it is, I never said it was via wifi. This exploit would be via lan or internet
http://xenforo.com/community/thread...ter-if-so-stop-using-it-youre-not-safe.61738/Just tried it via my IP to my D-Link at the (that I just plugged in to test). No joy... but guess that is due to the fact that I have port 80 routing to my server instead.
I have pretty much come to a similar conclusion, all consumer level network hardware seems to be crap now a days.To be fair, all the major router manufacturers have gotten pretty careless recently. You name it, they probably have something that's just waiting to be exploited.
Great...there goes my plan of trying to find a school to officially teach me to program. Guess I'll go back to grunt work.The problem lies in the fact too many schools, academies, etc. teach code and how to make it operational. They always forget to make the code resilient and secure.
Great...there goes my plan of trying to find a school to officially teach me to program. Guess I'll go back to grunt work.
We use essential cookies to make this site work, and optional cookies to enhance your experience.