Quoting Albert Warnecke ([EMAIL PROTECTED]):

> Ok then, what�s the pen-side for you? I thought, that what Nessus is doing is 
> pen-testing. It tries all the buffer overflows and cross side scripting + the 
> nmap-scanning. 

How does the router react to large amounts of illegitimate or simply
non-RfC traffic? Is the DSL router configured to accept incoming admin
commands from predifined hostnames or IP-addresses? Can I, by simply
poisoning the associated DNS server, trick the router into "updating"
itself with an image I prepared and poisoned? Is there a backdoor in,
such as a 'vendor login' or something similar?

Opening the router and dumping the ROMs is what I'd do first, then do
some simulated DSL environment tests, including checks for DoSability
and breakins.

> circumstances will break into their router. I think, that if a
> router fends off the kiddies and their scripts + all unneccessary
> services closed + strong passwords it should be fine for the target
> group.

This target group (workstations on permanent-on connections) is -
unfortunately - the prime candidate for kiddies looking for places to
install 'zombies'.

> > because Zope has such a small 'Marketshare' (it still rocks, though).
> 
> But has already it�s own Nessus plugin :-)

Yeah, but does it find that nasty VirtualHostMonster bug? :))

Reply via email to