Penetration Testing mailing list archives
Re: "hacking" a wireless ap firmware
From: Michael Puchol <mpuchol () sonar-security com>
Date: Fri, 07 Jul 2006 18:59:57 +0200
Hi, You can start looking here: http://www.openwrt.org and http://www.dd-wrt.orgwhich are alternative linux-based firmware, supporting many features, such as captive portals, IDS systems, etc.
However, the simplest way to "hack" an AP to perform nasty things would be to change the DHCP DNS entries to ones you own, so all clients would be checking against your servers...this is why I use static DNS even with DHCP. An exception to this is when you have a captive portal, which must supply you its own DNS entries, otherwise it cannot perform the function it is designed for.
Regards, Mike Norbert François wrote:
Hi everybody... After a discussion with a friend of mine, I argued that it was possible to change the behaviour of a firmware, so that an attacker could put a backdoor inside, for instance :S... Perhaps I spoke a bit quickly, 'cause now I feel a bit lost in modifying the firmware :(. Basically, every access point proposes you to update its firmware... Most of the fime, these firmware are sold in a *.bin format. After having tried to search for relevant strings in the bin, disassembling it and loosing time, I'm still at the same point :(. Do you have any experience in firmware modification ? Do you know in which language firwares are written ? Maybe tryin' a decompilation could help me... Thanks a lot Norbert------------------------------------------------------------------------------This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- "hacking" a wireless ap firmware Norbert François (Jul 07)
- Re: "hacking" a wireless ap firmware Michael Puchol (Jul 07)
- Re: "hacking" a wireless ap firmware Rogan Dawes (Jul 07)
- Re: "hacking" a wireless ap firmware David M. Zendzian (Jul 07)
- Re: "hacking" a wireless ap firmware Jorge Augusto Senger (Jul 07)
- Re: "hacking" a wireless ap firmware Franck Veysset (Jul 10)
- Re: "hacking" a wireless ap firmware haad (Jul 14)