tailieunhanh - Ethical hacking and countermeasures - phần 35

Tham khảo tài liệu 'ethical hacking and countermeasures - phần 35', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | c EH Certified Ethical Hacker Ethical Hacking and Countermeasures Version 6 Module XXXV Hacking Routers Cable Modems and Firewalls IM c E H News Certified Ethical Hacker OriginalURL http 2008 01 15 home router insecurity Most home routers vulnerable to remote take-over By Dan Goodin in San Francisco Published Tuesday 15th January 2008 04 13 GMT Security mavens have uncovered a design flaw in most home routers that allows attackers to remotely control the devices by luring an attached computer to a booby-trapped website. The weakness could allow attackers to redirect victims to fraudulent destinations that masquerade as trusted sites belonging to banks ecommerce companies or health care organizations. The exploit works even if a user has changed the default password of the router. And it works regardless the operating system or browser the computer connected to the device is running as long as it has a recent version of Adobe Flash installed. This is a huge problem Adrian Pastor of the prolific hacking organization GNUCitizen said in an instant message. Source http Copyright by Ec-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited IM c EH Module Objective Certified Ethical Hacker This module will familiarize you with Identify Router Identifying Vulnerabilities Exploiting Vulnerabilities in Cisco IOS Brute-Forcing Services Analyzing the Router Config Cracking the Enable Password Attacking Router Types of Router Attacks Reconfigurations by Attackers Pen-Testing Tools Cable Modem Hacking Bypassing Firewalls EC-Council Copyright by Ec-Council All Rights Reserved. Reproduction is Strictly .

TỪ KHÓA LIÊN QUAN