DocScrutinizer05 | BETROFFENE SYSTEME | 11:38 |
---|---|---|
DocScrutinizer05 | - Cisco Access Point WAP4410N | 11:38 |
DocScrutinizer05 | - CISCO Gigabit Security Router | 11:38 |
DocScrutinizer05 | - CISCO Gigabit Security Router RVS4000 | 11:38 |
DocScrutinizer05 | - CISCO Gigabit Security Router WRVS4400N 1 | 11:38 |
DocScrutinizer05 | - CISCO Gigabit Security Router WRVS4400N 2 | 11:38 |
DocScrutinizer05 | - Linksys Router | 11:38 |
DocScrutinizer05 | - Netgear Router | 11:38 |
whitequark | what about them | 13:38 |
DocScrutinizer05 | sorry, flooding channel. Anyway those have open backdoor | 13:46 |
larsc | they are sorrow-stricken systems | 13:46 |
DocScrutinizer05 | port 32764 | 13:52 |
larsc | it's not a backdoor, it's called factory configuration interface ;) | 13:54 |
DocScrutinizer05 | lol | 13:54 |
larsc | it is not that uncommon that they forget to remove them before shipping the device | 13:56 |
DocScrutinizer05 | :nod: | 13:56 |
DocScrutinizer05 | if you wanna check your infra: <http://www.heise.de/security/dienste/portscan/test/go.shtml?scanart=3> ; check first line "[_] Ich bestätige, dass ich berechtigt bin, die IP-Adresse 88.217...", check "(_) Mein Scan"; enter 32764 to the textfield "Max. 10 Ports, bitte mit Kommata trennen:" below | 14:00 |
DocScrutinizer05 | click "Scan starten" | 14:01 |
DocScrutinizer05 | .s/infra/router/ | 14:03 |
DocScrutinizer05 | don't run this test from inside a paranoid corporate LAN, your sysop will visit you ;-) | 14:04 |
larsc | He will visit heise | 14:06 |
DocScrutinizer05 | that too ;-) | 14:43 |
DocScrutinizer05 | or he's good at his job and doesn't even take notice from such a silly portscan | 14:45 |
Action: whitequark sighs at russian twitter | 20:11 | |
DocScrutinizer05 | uh? | 22:24 |
DocScrutinizer05 | shoot the message to the next skyscraper with a ak47? | 22:25 |
--- Tue Mar 11 2014 | 00:00 |
Generated by irclog2html.py 2.9.2 by Marius Gedminas - find it at mg.pov.lt!