Share One Broadband Connection with Wireless Users
The 3Com OfficeConnect Wireless Cable/DSL Gateway is an affordable and easy-to-use small business solution that lets wireless and wired PCs and laptops share a single broadband Internet connection.
Specially designed for small offices, branch offices, and the home, the gateway combines an integrated 802.11b Wi-Fi wireless access point and a four-port Ethernet/Fast Ethernet switch. Up to 32 wireless users or up to 253 total wireless and wired users can share access to a single cable or DSL modem. This means an entire office can economically take advantage of a single broadband connection.
The 3Com OfficeConnect Wireless Cable/DSL Gateway includes many of the IP routing and firewall privacy features of a full-scale router or firewall, at a fraction of the price. Multiple security features protect data and applications. The gateway is easy to install and configureoften no manual configuration is required. And because it conforms to the Wi-Fi wireless standard, it works with any Wi-Fi compatible equipment.
Download 🗹 https://t.co/21h42d8tN9
During last month, just around the holiday festivals, Adrian and I did some investigation about potential uses and abuses of the so called UPnP (Universal Plug and Play). The reason why we started playing with this particular technology was mainly due to an urge to discover other creative ways to break into embedded devices. What we have discovered was not necessarily new but rather interesting and very, very intriguing. Soon we realized that very few people in the security/hacker circles are aware of what UPnP is for and how to make use of it. We thought that this is a huge gap which needs to be filled since during our investigations we stumbled upon many networks and devices vulnerable to various types of UPnP related attacks. The number of UPnP related vulnerabilities is quite concerning and we believe that we should pay more attention on this technology in the future.
Keep in mind that this article is not referring to any bugs discovered within the UPnP protocol itself or the devices that support it. We simply expose how UPnP works and how it can be attacked. Though, Adrian has a very interesting research coming up which I think will make you flip out. HE SHOWS HOW TO EXPLOIT UPNP REMOTELY EVEN WHEN NO SERVICES ARE INTERNET FACING ON THE IGD (Internet Gateway Device).
Universal Plug and Play (UPnP) is a set of computer network protocols promulgated by the UPnP Forum. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and corporate environments. UPnP achieves this by defining and publishing UPnP device control protocols built upon open, Internet-based communication standards. Wikipedia
To sum up, UPnP is a set of protocols that deals with the discovery and use of devices that are hot-plugged in a network. The types of devices which usually support UPnP are Home Wirless/ADSL Routers, Printers, Mobile Phones, Cameras, TV boxes, in the future maybe even toasters, fridges, washing machines, etc. Because it is a burden to configure each device separately, we use UPnP to manage them all. Not only that, but we can also use UPnP so that devices can manage themselves. How is that possible?
We mentioned earlier that UPnP is based on several technologies, which are: SSDP (Simple Service Discovery Protocol), GENA (Generic Event Notification Architecture), SOAP (Simple Object Access Protocol) and free format XML (Extensible Markup Language). Each of these technologies is responsible for dealing with particular parts of the UPnP stack. Here are a few things that you need to know about UPnP:
And this is how UPnP works in general. I suggest to read some of the documentation available on the net to get better understandings off UPnP because it is something worth knowing about, as you will see next.
I will leave the interesting and NEW stuff to Adrian but in general every device that supports UPnP is probably hackable. Let's say that you connect to an open WIFI network and you can see the gateway which is some home hub or whatever type of wireless router it might be. As an attacker/pen-tester, you will probably try to guess the administrative credentials which you can use for the WEB admin interface. If the the device happens to be left with default configuration, you are a lucky man and you can proceed after several attempts of things such as admin, adm, password, pass, guest, etc for the BasicAuth credentials. What happens if someone has actually made the effort to change the default password? Pick up the bruteforcers? Hold on!
In situations like that, I would rather go with UPnP. First of all, UPnP does not support any means for authenticating with the device. Second, most wireless routers provide UPnP functionalities which can change the entire device configuration and as such expose it to further attacks. I've seen numerous networks where we can very easily change the DNS server of the UPnP enabled wireless router. This is pretty much equal to rooting your machine but mainly applicable to networks. In cases like this, the attackers will be able to control your network traffic from the moment they send the "Change of DNS Server" UPnP request. Many wireless devices also allow to change the admin password, add port forwarding rules (a.k.a poking holes into your firewall and exposing Intranet services on the Internet), configure dynamic DNS, reboot the router, disconnect PPP, steal PPP credentials, reset PPP credentials, configure wireless settings, retrieve wireless settings, etc, etc, etc. Yes, you do not need any authentication whatsoever.
The future promises that even more device will become UPnP enabled and that will increase the attack surface of UPnP related hacks. Imagine a future where attackers can order food for your fridge on behalf of you or switch of your electricity with nothing more but a single SOAP request.
There are a few good tools that I use for UPnP penetration testing although most of them have huge limitations. This is the reason why I am developing my own UPnP testing toolkit which will be available for download soon.
Over the last couple of days there was loads of FUD regarding viral-like attack for WiFi networks. I've read the proposed paper and I couldn't find anything practical about it, though I have related the viral concept to the UPnP research that we have been doing at GNUCITIZEN.
The truth is that it is trivial to root open WiFi networks. All attackers need to do is to drive by the access point, send SSDP discovery request, read the access point description, check whether there is a method for changing the DNS server, execute the SOAP request to change the DNS of the router to an external DNS server that is controlled by the attacker and move on the next target.
If this is not scary I don't know what is. UPnP is a serious risk and it is a surprising that very few people pay attention or even know how to make use of it. Stay tuned. A very interesting post comes next.
Secure, Reliable, 108Mbps, PoE, Wireless Connectivity with Sophisticated Features The dual band user configurable 802.11a or 802.11b/g, Wi-Fi certified 3Com Wireless 7760 11a/b/g PoE Access Point is an attractive solution for cost effectively and securely extending mobile access to wired network resources or creating full-featured networks in small and medium businesses, remote sites, or temporary locations. With ultra-fast speeds of up to 108 Mbps in turbo mode, and superior long-range connectivity with eXtended range (XR) technology this access point supports up to 64 wireless users, so there is plenty of room for growth.
I bought a bunch of these used in a municipal auction. When configuring them, I discovered that as soon as I configured them to a hardcoded IP address, the login screen would stop working (the submit button would just cycle back to the login screen). After learning elsewhere that this product was particularly sensitive to differences in the Javascripts of different browsers, I switched from Safari to Firefox and was able to login again. Other than this one peculiarity, I have been happy with their performance.
PoE with 802.1x works pretty well considering this is in many branch offices with a remote RADIUS server. They seem to need a reboot/power cycle every week or so even with 1.6.42 firmware thus far however.
These units work well to provide a wireless network connection to multiple wired devices. We are running a couple of these units to provide a wireless network connection to a local 5 port switch with printers and workstations plugged into it.
As its lengthy moniker suggests this little slab of plastic offers support for Internet access over ADSL and backs it up with a firewall and a SuperG 802.11g wireless access point. It offers a four port Fast Ethernet switch and integral ADSL2/2+ modem and backs this up with plenty of tough security measures plus optional web content filtering.
During testing we found it worked well with the filter blocking the majority of sites that fitted into categories we had set to deny. Each request is relayed to the selected web site for checking and we found there was virtually no hit on general browsing performance. No custom warnings can be sent to users as their browser will simply display the standard message that a web site cannot be found. You do get URL blocking as standard but this requires a list of up to thirty URLs or keywords to be manually created. However, you can also create policies that block or allow Internet access for LAN systems during scheduled time periods on selected days.
At first glance this looks a good value communications package but the numerous problems we experienced leave us with no option but to recommend avoiding it. The setup routine is fundamentally flawed, all modifications no matter how small all require a reboot and the review unit suffered from a number of system failures during testing.