Quoting Albert Warnecke ([EMAIL PROTECTED]): > Ok then, what�s the pen-side for you? I thought, that what Nessus is doing is > pen-testing. It tries all the buffer overflows and cross side scripting + the > nmap-scanning.
How does the router react to large amounts of illegitimate or simply non-RfC traffic? Is the DSL router configured to accept incoming admin commands from predifined hostnames or IP-addresses? Can I, by simply poisoning the associated DNS server, trick the router into "updating" itself with an image I prepared and poisoned? Is there a backdoor in, such as a 'vendor login' or something similar? Opening the router and dumping the ROMs is what I'd do first, then do some simulated DSL environment tests, including checks for DoSability and breakins. > circumstances will break into their router. I think, that if a > router fends off the kiddies and their scripts + all unneccessary > services closed + strong passwords it should be fine for the target > group. This target group (workstations on permanent-on connections) is - unfortunately - the prime candidate for kiddies looking for places to install 'zombies'. > > because Zope has such a small 'Marketshare' (it still rocks, though). > > But has already it�s own Nessus plugin :-) Yeah, but does it find that nasty VirtualHostMonster bug? :))
