Citizens First Cyber Security Professionals cfcspro.com

Login

Username

Password



Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

Connect via Facebook

Connect via Facebook

Member Poll

There are no polls defined.

Shoutbox

You must login to post a message.

02-12-2017 12:08
Yo' Citizens, How you doing today. Todays Lesson plans & post will consist of, How to give spammers a taste of their own medicine! Cool

20-10-2017 11:38
Yo' Citizens, As per your request. A new forum section, 'Suspicious IP Addresses' will be completed today! Cool

20-10-2017 11:30
Yo' Good Morning Citizens. I hope that you are all having a great and cyber-secure day! Grin

09-10-2017 11:10
Yo' Good Morning Citizens! Wink I hope that you had a cyber-secure weekend! Grin

03-10-2017 10:44
Yo' Citizens, good morning. I have some pretty serious vulnerabilities to share with you, today. I will have them up shortly! Cool

Welcome Citizens

Welcome to, Citizens First Cyber Security Professionals.

The Individual Citizen Specific, Cyber Security Investigative Services Firm. Cyber Security Web Forum and Educational Cyber Security Dojo.

Geared strictly to helping Individual Citizens and Small Businesses! Address unwanted cyber security intrusions and hacking incidents!

Flaws in ISP gateways let attackers remotely tap internet traffic - Via - HackRead

SecurityYo' Greetings Citizens,

Flaws in ISP gateways let attackers remotely tap internet traffic - Via - HackRead


Defcon is the most important event for the DIY hacking community and this year too, the conference was held in the same spirit. We got to learn about a variety of novel hacking ideas such as the hacking of Voting Machines, hacking airborne drones, hijacking phone numbers and Internet connected car wash system etc. However, there is one story that has been somewhat ignored by many within the tech fraternity but which is extremely important to be noted.

This was noticed by David Holmes of SecurityWeek who reported that it was the “Cable Tap: Wireless Tapping Your Home Network” talk, which initially was believed to be just a brief discussion on how to track what’s happening on your home network but in reality, it turned out to be way “broader” in its scope.

Marc Newlin, Logan Lamb and Christopher Grayson with Bastille Networks and Web Sight have managed to identify 26 different flaws and weaknesses in the ISP network devices. These vulnerabilities would easily provide remote admin access to most of the home networks currently used in the US.

The crux of the research was that there happen to be a large number of critical weaknesses in “ISP provided, RDK-based wireless gateways and set-top boxes.” These vulnerabilities are identified in devices manufactured by Cisco, Arris, Technicolor, and Motorola.

“We discovered a wide array of critical vulnerabilities in ISP-provided, RDK-based wireless gateways and set-top boxes from vendors including Cisco, Arris, Technicolor, and Motorola. Our research shows that it was possible to remotely and wirelessly tap all Internet and voice traffic passing through the affected gateways, impacting millions of ISP customers.”


The research team demonstrated at Defcon that remotely and wirelessly tapping all the Internet and voice traffic that passed through an active gateway was possible.” They also stated that these findings applied to tens of millions of ISP customers. The scope of hack ranges from reverse-engineering the Comcast Xfinity routers’ MAC address generation process to exploit the flaws present in the FastCGI Subsystem. This system is used by web servers like Apache, Lighttpd, and Nginx.

Until now we believed that Xfinity access point ensures that you have your private network and offers a public wireless network “Xfinity wifi” for providing an access point to roaming Comcast customers, who can use it by entering their credentials. However, at the Defcon it was revealed that it has another hidden WiFi network apart from the above mentioned two. This network is named XHS-XXXXXXXX. XXXXXXXX indicates the lower four bytes of the cable modem/CM MAC and this hidden WiFi network is generated deterministically through the interface’s MAC address.

The team of researchers identified around four different methods to get the MAC address and one of these methods use the Xfinity wifi public network connectivity since the DHCP ACK contains the CM MAC address. When the researchers hacked the Xfinity wifi using the MAC address, they were able to understand the passphrase and access the Xfinity wifi network without needing to use their personal Comcast credentials...++...

Please Read The Full Story here: https://www.hackread.com/critical-flaws-in-isp-gateways-lets-attackers-remotely-tap-internet-traffic/

Thank You For Your Time, Citizens. I hope that you have a great and cyber-secure day!

Thank You Citizen,
The Administration

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
top image scrolling tools
facebook_share
twitter_share
google_share
linkedin_share
blogger_share
delicious_share
scrolltop
Render time: 0.06 seconds
256,168 unique visits