kerpap Posted January 11, 2012 Share Posted January 11, 2012 I have noticed in my region that a lot of open wifi routers have their port 23 open to its linux kernel. I use overlook fing on my droid and can easily connect via telnet using admin/admin,. I notice these exact routers are also connected to their credit card machines. is it really so bad these days that hacking can be so easy? I have been to several bar/grill type places and have seen this type of setup.. recommended action.... FIX IT! this is on some linksys routers and some telco issued routers. my guess is it is left there for help desk related fixes. I brought it to the attention of my favorite bar (im friends with and I was aware of the risk) and I was awarded a free dinner which I refused. I simply said I wont accept, just fix the security hole. Quote Link to comment Share on other sites More sharing options...
int0x80 Posted January 12, 2012 Share Posted January 12, 2012 Internet is still wide-open; it's fantastic, a huge virtual playground :) Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted January 12, 2012 Share Posted January 12, 2012 I fixed up the wireless network for my favorite mexican restaurant and they gave me free pitchers of golden margaritas :) Quote Link to comment Share on other sites More sharing options...
Diggs Posted January 12, 2012 Share Posted January 12, 2012 Man. I have done terrible, terrible things for pitchers of margaritas. If I would have just known setting security for a router would have gotten me that, I would need a lot less shots every time I go to the doctor's. Quote Link to comment Share on other sites More sharing options...
telot Posted January 12, 2012 Share Posted January 12, 2012 Man. I have done terrible, terrible things for pitchers of margaritas. If I would have just known setting security for a router would have gotten me that, I would need a lot less shots every time I go to the doctor's. rofl was thinking the same damn thing... telot Quote Link to comment Share on other sites More sharing options...
Blak3 Posted January 12, 2012 Share Posted January 12, 2012 Too bad, none cafe's in my country have internet <_< Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted January 13, 2012 Share Posted January 13, 2012 God I love infosec. Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted January 13, 2012 Share Posted January 13, 2012 God I love infosec. Its very powerful isn't it. That's why it should always be used with care or it might backfire at you. Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted January 16, 2012 Share Posted January 16, 2012 Lol... what are you trying to say yoda? Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted January 17, 2012 Share Posted January 17, 2012 Like Darren says, as long as your intentions aren't evil/malicious, you're alright. We all need to practice what we learn in the real world, but in a responsible manner. Besides, anyone who posts on hak5 who says they haven't cracked a WEP network in the wild or got a meterpreter shell from the wild without first getting permission from the owner is lying : P Quote Link to comment Share on other sites More sharing options...
barry99705 Posted January 17, 2012 Share Posted January 17, 2012 Like Darren says, as long as your intentions aren't evil/malicious, you're alright. We all need to practice what we learn in the real world, but in a responsible manner. Besides, anyone who posts on hak5 who says they haven't cracked a WEP network in the wild or got a meterpreter shell from the wild without first getting permission from the owner is lying : P I've never gotten a Meterpreter shell in the wild. (I've never used meterpreter...) :P Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted January 17, 2012 Share Posted January 17, 2012 Like Darren says, as long as your intentions aren't evil/malicious, you're alright. We all need to practice what we learn in the real world, but in a responsible manner. Besides, anyone who posts on hak5 who says they haven't cracked a WEP network in the wild or got a meterpreter shell from the wild without first getting permission from the owner is lying : P You are absolutely correct, and you will be surprised that there are people who actually use these skills for evil or malicious intent. And that's something I DO NOT encourage or condone. Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted January 18, 2012 Share Posted January 18, 2012 You are absolutely correct, and you will be surprised that there are people who actually use these skills for evil or malicious intent. And that's something I DO NOT encourage or condone. If it weren't for the people who used what they know for malicious purposes most of us here wouldn't have jobs : P Quote Link to comment Share on other sites More sharing options...
nopenopenope Posted January 18, 2012 Share Posted January 18, 2012 I fixed up the wireless network for my favorite mexican restaurant and they gave me free pitchers of golden margaritas :) ________________________ |.........................................| |.........................................| |....Will White Hat for Beer....| |.........................................| |.........................................| ------------------------------------------- Quote Link to comment Share on other sites More sharing options...
misfitsman805 Posted January 18, 2012 Share Posted January 18, 2012 Besides, anyone who posts on hak5 who says they haven't cracked a WEP network in the wild or got a meterpreter shell from the wild without first getting permission from the owner is lying : P What is this Meter preter shell you speak of? What kinda of sea creatures do the shells come from? Quote Link to comment Share on other sites More sharing options...
kerpap Posted January 21, 2012 Author Share Posted January 21, 2012 the major telco here issues these wifi routers to their customers. they are 2WIRE routers and guess what encryption they use... Worthless Encryption Protocol also the admin control panel is almost never secured and is wide open. you can probably deduce what country I am in, and that the entire "island" is a war driver's paradice. Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted January 21, 2012 Share Posted January 21, 2012 What is this Meter preter shell you speak of? What kinda of sea creatures do the shells come from? If you haven't heard of Metasploit then I would recommend reading up on that first, than you will be able to understand what Meterpreter shell means. Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted January 21, 2012 Share Posted January 21, 2012 Hah I believe he was using sarcasm infiltrator. At least I sure hope he was. It did sound like sarcasm, but I just wanted to make sure. That's why I answered it. Quote Link to comment Share on other sites More sharing options...
misfitsman805 Posted January 21, 2012 Share Posted January 21, 2012 It did sound like sarcasm, but I just wanted to make sure. That's why I answered it. Yupp it was complete sarcasm :) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.