Home | News | Discover | Search | Music Store | Zone Reload | Promo | Ask for Help | Submit | FAQs


Members Login
Username 
 
Password 
    Remember Me  

PBTV

Official Sponsor


Chatbox

Please log in to join the chat!

Image and video hosting by TinyPic
Image and video hosting by TinyPic
 

Topic: "Millions" Of Home Routers Vulnerable To Web Hack

Page 1 of 1  sorted by


For maximum scope and convenience, Poui Bloom is divided into varied forums from how to deal with exam stress and pass exams to general discussion topics which may not be academic but are relevant nonetheless.

Our parent site Mediazoneja is focused on Jamaica/Caribbean music and has something for everyone. Wanna chat...we are on 24/7, for authentic reggae/dancehall and DJs...just tune in and for news and information about Jamaica and the Caribbean...we are updating minutely!!

Join the Zone and over 85,000 strong export the very best of reggae/dancehall to be found anywhere on the Net...


***Also, as you browse the PouiBloom, ...we invite you to check out these sites***

Movitly - Movies, internet TV & online videos..

Mixadio - Clash, mixes, dub poets, djs and more...

OneCarib - Everything you wanted to know about the Caribbean!
Veteran Member
Status: Offline
Posts: 81
Date:

"Millions" Of Home Routers Vulnerable To Web Hack

Permalink  
 


4790862156_011bfa1e6f_m.jpg

The upcoming Black Hat security conference in Las Vegas offers an annual parade of security researchers revealing new ways to break various elements of the Internet. But few of the talks have titles quite as alarming as one on this year's schedule: "How to Hack Millions of Routers."

Craig Heffner, a researcher with Maryland-based security consultancy Seismic, plans to release a software tool at the conference later this month that he says could be used on about half the existing models of home routers, including most Linksys, Dell, and Verizon Fios or DSL versions. Users who connect to the Internet through those devices and are tricked into visiting a page that an attacker has set up with Heffner's exploit could have their router hijacked and used to steal information or redirect the user's browsing.

Heffner's attack is a variation on a technique known as "DNS rebinding," a trick that's been discussed for close to 15 years. "There have been plenty of patches over the years, but this still hasn't really been fixed," he says.

The hack exploits an element of the Domain Name System, or DNS, the Internet's method of converting Web page names into IP address numbers. (When you visit Google.com, for instance, a domain name server might convert that name into the IP address 72.14.204.147.) Modern browsers have safeguards that prevent sites from accessing any information that's not at their registered IP address.

But a site can have multiple IP addresses, a flexibility in the system designed to let sites balance traffic among multiple servers or provide backup options.

Heffner's trick is to create a site that lists a visitor's own IP address as one of those options. When a visitor comes to his booby-trapped site, a script runs that switches to its alternate IP address--in reality the user's own IP address--and accesses the visitor's home network, potentially hijacking their browser and gaining access to their router settings.

That DNS trick isn't new, and browsers have installed patches for earlier versions of the exploit. But Heffner says he's tweaked it to bypass those safeguards; He won't say exactly how until his Black Hat talk. "The way that [those patches] are circumvented is actually fairly well known," says Heffner. "It just hasn't been put together like this before."

 

Potential fixes implemented in the free DNS replacement OpenDNS and the Firefox NoScript plug-in won't prevent his exploit, Heffner adds.

One comfort for users may be that Heffner's method still requires the attacker to compromise the victim's router after gaining access to his or her network. But that can be accomplished by using a vulnerability in the device's software or by simply trying the default login password. Only a tiny fraction of users actually change their router's login settings, says Heffner. "Routers are usually poorly configured and have vulnerabilities," he says. "So the trick isn't how to exploit the router. It's how to get access to it."

That means concerned users should make sure their router's firmware is updated and patched, and that they're not using default security settings.

Heffner, like most security researchers revealing dangerous bugs, argues that releasing an exploit may be the most effective way to draw attention to severity of the problem and convince both browser and router makers to fix the fundamental vulnerability. "Im not the first to give a Black Hat talk on DNS rebinding, and I wont be last," he says. "Everyone has had ample time to fix this."

 

_______________________________________________________________________



 



__________________
*Genius On Board*
Status: Offline
Posts: 529
Date:
Permalink  
 
this guy should be my best friend

__________________

Little girl moving around on the floor

Page 1 of 1  sorted by
Quick Reply

Please log in to post quick replies.