RouterSecurity Presentation d21 PDF
RouterSecurity Presentation d21 PDF
MichaelHorowitz.com
RouterSecurity.org
DefensiveComputing.info
@defensivecomput
November 1, 2017
Preaching to the choir, I know
Every bad thing you can imagine
Spy on you; man in the middle attacks
Send you to scam websites to steal passwords
Join a botnet for DDoS attacks
Download infected versions of software
Make money by inserting ads in web pages
Crypto mining
Attack all the devices connected to it
Change data in-flight
Block data (think Military orders)
Modifying DNS servers are a popular attack
Even if you hard code DNS servers on your
device, router can over-ride this
Good habit: checking current DNS servers
RouterSecurity.org/testrouter.php
page lists many sites that report current DNS
servers
Browserleaks.com is a site that reports on
current DNS servers. Sample output below:
I wasn’t born this way
Password? We don’t need no stinking password
Consumer routers have a hard coded 8 digit WPS PIN code
• 8 digit pin code ==> only 11,000 possible values
• Result of incompetence or to enable spying?
• Very little HTTPS back in 2007 when released
• Rate limiting in spec, not always implemented
• One router disabled WPS in UI, not in reality
Business routers do not support WPS
Consumer routers still support WPS
michaelhorowitz.com
RouterSecurity.org
@defensivecomput