Penetration Testing mailing list archives

Re: Router Access


From: Neil Moore <neil () droopy com>
Date: Wed, 1 Jun 2005 19:47:20 -0400 (EDT)

Opening all the ports inward bound to the clients real IP address and scanning them for vulnerabilities would be my next step in a pentest.
-Neil Moore  CCIE #10044 (R&S/Security/Service Provider)

On Wed, 1 Jun 2005, Sherwyn Williams wrote:

This might be a dumb question but here goes!

once someone gets access to a say linksys for instance apart from setting up remote access to the router, or getting the clients real ipaddress, what else can someone do. I am doing a pentest, and I want to show what are some of the ways that someone can use the router acess to the advantage.



Sherwyn Williams
Technical Consultant
(917) 650-5139
Sherwill22 () tmail com



Current thread: