* Posts by Mel

8 publicly visible posts • joined 16 May 2008

VPNFilter router malware is a lot worse than everyone thought

Mel

Re: What I'm having trouble understanding...

The unique default credentials used in some routers, while better than using a single login would not necessarily guarantee they are secure, although they probably wouldn't be likely targets for this given they are not straight forward.

Some use relatively short passwords of known length and even a limited set of characters, so a dictionary attack could be practical.

Some of the sky routers generated a unique adsl password and wifi credentials using the mac address (there was a website to calculate adsl passwords given the mac etc), so if in wifi range it might even be possible to determine the wifi password.

Never stick with default passwords, and that includes the default wifi password.

Mel

Re: Dg834

That's bad.

Make sure you were logged out before testing for the password bypass, as I recall Netgear's firmware just used a cookie to check if you are logged in and won't ask for a password again until it has expired.

I've posted a hack to patch the password issue for the DG834N (may work on some other models), although it doesn't address any shell exploits, if it works and you log out after using the interface, you should hopefully at least need a password to exploit it.

https://pathogenrush.blogspot.com/2018/06/netgear-dg834-router-series-password.html

Mel

Dg834

dg834! About time you bought a new router, I'm surprised it is still working.

If you are using the standard netgear dg834 (g/gt/n) firmware, the following URL should display the nvram settings which includes passwords etc without requiring a password. (it just runs the nvram show shell command, it doesn't change any settings or do anything harmful)

I've split it in two as otherwise it gets truncated by the forum software.

http://routerlogin.net/ca/setup.cgi?todo=ping_test&next_file=../diagping.htm&c4_IPAddr=1%26

/usr/sbin/nvram+show>%261

I reported the password bypass vulnerability over 10 years ago, so they had plenty of time to fix it.

It was possible to patch it without flashing by injecting a script using the same exploits into the router's nvram that runs when booted.

Building a new firmware with a .htpasswd file linked to /etc/htpasswd in the ca directory should fix the password vulnerability, but not the shell exploit.

WPA2 KRACK attack smacks Wi-Fi security: Fundamental crypto crapto

Mel

Re: 4 Years ago in a land far far away.

Hmm, I reported an issue I discovered to Netgear quite some years ago regarding their DG834 range (G,GT,N..) firmware when they were still current routers, that I don't believe was ever fixed.

It was possible to bypass the login details and gain root access, due to no password protection on a sub-directory within the router's Httpd web server directory, plus various shell exploit vulnerabilities in the web interface, which would allow a hacker full root access to the router, including accessing all setting stored on the router, downloading and running binary code from the internet on the router and flashing custom firmware.

It was remotely exploitable as a reflective attack, by getting a victim's browser to request a specially crafted URL by, for example, posting it as an image link in a forum post.

I did consider publicly releasing a temporary fix which used the same exploits to clone the router's web directory to the ram based temp directory, omitting the unprotected setup directory, and set the router's httpd server to use that instead.

I subsequently also discovered that it was possible to inject scripts into the router's NVRAM settings so that they'd survive a reboot and run automatically, so a hacker could fully own the router without even needing to replace the firmware.

All the password vulnerability needed was a link to the password file added to the setup directory to make it password protected. The various shell exploits needed a lot more work to fix, but without the password bypass they wouldn't have been quite so serious.

As far as I know, I believe the only router to be fixed was the Sky supplied dg834gt, and that was only because Sky replaced the standard firmware with a sky customised version which since it didn't require it, had omitted the setup web sub-directory, removing the password bypass vulnerability.

Hopefully most will have been thrown out, or died and gone to landfill by now.

Site schools world+dog in browsing history pilfering

Mel
Dead Vulture

Who needs noscript

If you want to restrict javascript in Opera or IE -

Restricting javascript in Opera is easy enough:- Tools->preferences->advanced->content, and untick enable javascript. Then if you wish to allow javascript on the site you are visiting: Rightclick ->Edit site preferences->scripting->enable javascript. Simples!

Restricting it in Internet Explorer is slightly more complicated: you need to adjust the settings for IE's trusted sites down to the same level as the internet zone (medium-low), then either increase the internet zone level, or customise it to disable scripting. Javascript will then only run on sites that you add to the trusted zone.

These "history pilfering" scripts exploit the fact that browsers render visited links in a different colour. They add to the page whatever urls they wish to check so that they can inspect the rendered colour, which reveals if the URL is visited or unvisited.

Disabling javascript breaks too much of the web for me, but it would be nice if the browser developers fixed their browsers so that the unvisited link colour was always returned.

Phorm mulls incentives for ad targeting wiretaps

Mel
Go

Free anti-virus software?

Hey, Phorm guys, if you are going to offer free anti-virus software to try to entice people to let you monitor their communications, then why not bundle your behavioural targeting wares within the anti-virus software.

You would save a fortune by not needing to pay the ISP to install your DPI hardware, which you wouldn't need either because the processing would be done by the end-user's PC.

It would also avoid the need to ping-pong the end-users traffic around to forge tracking cookies.

Oh, hang on... isn't that like the failed adware and spyware models, that is hugely unpopular - still at least you could prevent your anti-virus software from removing itself :)

Activist coders aim to deafen Phorm with white noise

Mel

@AC RE: OTELO

I'm surprised BT didn't cancel the contract before Otelo became involved - If Otelo accepts the complaint for investigation, then win or lose the BT will have to pay Otelo for investigating the case.

I read a few years ago that Otelo charged ISPs about £350 per case, and the fees are likely to have gone up a fair bit since then.

Mel

Who know anything about contract law?

BT like all ISPs are required to be a member of an Ofcom approved arbitration service - I believe BT are a member of OTELO

One option after you've followed BT's internal complint procedure, is to ask BT for a deadlock letter so you can complain to Otelo. http://www.otelo.org.uk/pages/4howtocomplain.php