Search
Recent Post
- How To Exploit A Format String Vulnerability
- Playing With Dns And Domain Names
- How To Get A Person Ip Via Msn Or Yahoo Ect.
- CR-LF injection(carriage return- line feed injection)
- [PAPER] Self spreading Malware for Soho Routers
- Assault On Oracle Pl/sql - Injection
- PHP modify PE header
- Safe Mode Bypass PHP 5.2.5 & 5.2.6
- Local File Inclusion Mysql Get Password
- [Video] Acquire root using c99 shell
Recent Comments
- admin:Sure :)
- Reader:Good work! Thank you very much
- Mr WordPress:Hi, this is a comment.To
Popular
- CR-LF injection(carriage return- line feed injection) (02-01-2009)
- SQL Commands (usefull for injection) Part 1 (01-22-2009)
- Top 10 Tricks to exploit SQL Server Systems (01-22-2009)
- [Video] Acquire root using c99 shell (02-01-2009)
- About (01-22-2009)
- Turn Your Mobile Cam Into WEBCAM (01-22-2009)
- Linux Data-Time setting (01-22-2009)
- Hello world! (01-22-2009)
- Playing With Dns And Domain Names (02-01-2009)
- Hackers View [HIEW] (01-22-2009)
[PAPER] Self spreading Malware for Soho Routers
February 1st, 2009 by admin_ABSTRACT_
So called Soho (Small home and office) routers have become extremely
popular in the last few years. While the good guys where busy trying to prevent
malware from infiltrating their desktop systems, the bad guys had gone one step
ahead of the game and started to experiment with these devices.
Close to nobody pays attention to the security of their routers and why should
they. These mystical devices have always been protected through security by
obscurity. This paper is not about how to reverse engineer routers, or how to
get the best possible security out of the original firmware. This is the real
stuff. Readers will learn the fundamental basics how routers can be taken
over. After a few examples we will then move into the field of
malware — self spreading of course.
Note: the intro got a bit long, but i think that it is worth reading
all of it. This wayy you can be shure to have good knowlege about
the subject.
http://data.nicenamecrew.com/papers/malwareforrouters/paper.txt
Leave a Reply