[Ninux-Wireless] backdoor su router linksys e netgear

Alessandro Gnagni enterprise.nx a gmail.com
Gio 2 Gen 2014 15:31:47 CET


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Simpatica come cosa....


Il 02/01/2014 14:23, Clauz ha scritto:
> Ciao. C'e' un tizio che ha trovato una backdoor sul suo router di
> casa. E' un processo che ascolta su una porta TCP e che, se non ho
> capito male, permette a chi conosce la backdoor di eseguire
> comandi, trovare le password nel router ed installarci qualunque
> eseguibile.
> 
> Backdoor confirmed in: - Linksys WAG200G - Netgear DM111Pv2 -
> Linksys WAG320N - Linksys WAG54G2
> 
> Backdoor may be present in : - NetGear DG934 [probability: 99.99%] 
> - Netgear DG834 - Netgear WPNT834 - Netgear DG834G - Netgear WG602,
> WGR614, DGN2000 - Linksys WAG120N, WAG160N, WRVS4400N
> 
> https://github.com/elvanderb/TCP-32764
> 
> Clauz
> 
> 
> 
> 
> _______________________________________________ Wireless mailing
> list Wireless a ml.ninux.org 
> http://ml.ninux.org/mailman/listinfo/wireless
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=Kifu
-----END PGP SIGNATURE-----



Maggiori informazioni sulla lista Wireless