Loading...
Saturday 15 June 2013

How Important is to Secure Your Router Password

Internet is not a secure place and you never know who is trying to get into your computer for their malicious purpose, as we have already discussed different security layers on various blog posts which includes but not limited to:














          IDS
  • Firewall
  • Antivirus
Internet Service Providers (ISP’s) are using dynamic IP addressing technique and a router act as a gateway to provide connectivity to user end device, a firewall is already installed on router and it acts as a security filtration service. Router is also responsible for NAT (Network Address Translation) protocol, which converts your internal IP (LAN) to external IP (WAN).

Router panel contains important information of the network behind it (LAN), it knows:
  • How many devices is attached with this router
  • What are the IP and MAC ADDRESSES?
  • What requests these devices are generating
  • Their requests can be sniff
  • More...

So the router administrative panel contains such a valuable information that an attacker might use for malicious purpose, the demonstration of the importance of router password is as follows:

Open ports in router can get from a quick NMAP scan








It shows that we can connect this router by using TELNET, FTP and of course HTTP. Let’s try to connect it by using TELNET protocol, password can be brute force and even guess.





FTP (file transfer protocol) is an important protocol of TCP/IP which let you to transfer files from one end to another end, let’s try to important it and try to browse some directories.




Now as you have seen that the weak password can create so many problems for you and an attacker might get benefits from a weak password. So the important point is to use the strong password combination that cannot be guess or even hack. Also, make sure your firewall should be enabling for extra protection.

Strong password creation technique has been discussed in another article that might help you to understand the password creation techniques.

0 comments:

Post a Comment

 
TOP