EvilZone

Hacking and Security => Hacking and Security => : blackrat December 19, 2014, 05:01:44 PM

: After you hacked a router
: blackrat December 19, 2014, 05:01:44 PM
Hello i have a question. And yes i have googled it. Many times. After you have gained access to a router what is the next step ? i know about Mitm(Not all of it)  but are there anything else that could be done.
: Re: After you hacked a router
: Kulverstukas December 19, 2014, 05:25:17 PM
This just shows your lack of knowledge, creativity and willpower.

But...

Very much depends on the router itself. If it's cheap shit and you cannot come close to the wifi zone, then you can't do much. More expensive or more widely used routers have SSH access which allows to do all kinds of cool stuff, however often you'll be dropped a limited shell...
Also today I stumbled upon this: http://mis.fortunecook.ie/
: Re: After you hacked a router
: d4rkcat December 19, 2014, 05:31:14 PM
Also today I stumbled upon this: http://mis.fortunecook.ie/

What did you think of that?
To me it is bullshit, because there is no poc or technical details.
If fact, this was removed TWICE from /r/netsec for that very reason.
It's like just a guy being like, "I can own all your routers, something cookie something, Here's a cool name with a logo."
: Re: After you hacked a router
: Kulverstukas December 19, 2014, 05:47:07 PM
I don't know the validity of it, but the site made me think it's serious, however if it's THAT serious, I haven't heard any news about it. It just popped in hacker news YTcombinator during my lunch break, so...
: Re: After you hacked a router
: Resistor December 19, 2014, 06:31:49 PM
threatpost put up an article about it fwiw.
http://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970
: Re: After you hacked a router
: Axon December 19, 2014, 06:46:10 PM
I'm really getting tired of this shit. Every time we see a skid asking how to do this and how to do that.
: Re: After you hacked a router
: elixxir December 19, 2014, 08:41:00 PM
Change the DNS server to one that you control. Then, run SET with credential harvester and prosper.