DEFCON Moscow: Hacking routers as Web Hacker

Thanks to all my collegues from HeadLight Security, who helped me with this research.

Hacking routers as Web Hacker

INTRO

Short review by securitylab:

Mikhail Firstov, in his “tank” review, critiqued modern routers and modems, noting that it seems “developers of these devices do not care about security.” XSS, CSRF, and RCE vulnerabilities are found in almost every device. Yota models can be encountered with a complete lack of authentication, ASUS allows you to open the source code of the page and see the login and password, and 4G routers from MTS and devices from Dlink are not far behind. The firmware itself is very easy to find on the Internet and analyze for various vulnerabilities, and simple Google dorks allow a hacker, who may not even understand SS7, to enter the operator’s internal network and upload a shell. The takeaway: a router is just like a website, and its security should not be overlooked.

SLIDES

PDF