Those who silently pit everyone ten years of the Router vulnerabilities large inventory

Source: Internet
Author: User

Two recent topics have attracted much attention, "haze, Wi-Fi security." A few decades of pollution have been recognized as the first documentary of The Big fire. Surprisingly similar to the day before the CCTV 315 party exposure wireless router to steal user account password, Wi-Fi security has gradually become a hot topic.

Wi-Fi has been popular for nearly a decade, these wi-Fi vulnerabilities have been in existence for ten years, below to count those who silently pit for ten years of the router loophole.

  Pin Vulnerabilities: Useless features, high-risk risks

When it comes to WPS, you may think of some office software, but what you should not know is that WPS is also an abbreviation for the Fast Connection feature on the router. No use? Normal, now most people will not use the WPS function to connect. That's the one thing that nobody uses. There is a huge risk: pin vulnerabilities.

  Pin code is a wireless internet device for a fast connection of a piece of code, this code only 8 digits, composed of pure numbers, WPS connection is through the route and network card matching pin.

So the problem is,pin number is very short, break pin code does not need any high-level hacker program, through the exhaustive method up to 2 hours to obtain a router PIN code, or even a liberal arts girls use a market price of 99 pieces of the RUB network card can easily be breached.

As early as the 2012 was burst, a domestic router brand has a pin loophole, resulting in a large number of users are rubbed net.

After three years, does the question still exist? The answer is:more than 80% of routers exist.

  Wi-Fi encryption Algorithm vulnerability: Could be remedied ten years ago

Have you ever tried using a 12345678 or 123123123 password to use a neighbor's net? Well, if you haven't, maybe someone borrowed yours. Digital password seems very long, but there are always rules to follow, you will certainly not use their own passwords, so, even number, birthdays, phone numbers become the most commonly used passwords, you remember it is convenient, hackers cracked up is also very convenient.

Solve this problem is very simple, set the password is a little more complex, the letter plus a number of special characters, it is best to distinguish case, this long password to crack the difficulty of geometric increase. Of course, the premise of being able to use long passwords is that routers must support the strong encryption mechanism of WPA/WPA2.

The reality is that not all home routers support WPA/WPA2 encryption. What is more puzzling is that many models of routers, although supported, but never remind users to use High-strength encryption, like bought the Advanced anti-theft lock not installed in the door but put in the wardrobe, effective protection into a vase.

Which year was the WPA2 encryption mechanism that made it easy for users to protect their privacy? The answer is: 2004.

  Routing Backdoor Vulnerability: a secret that a manufacturer cannot tell

If the above two vulnerabilities are caused by the negligence of product design, then the backdoor vulnerability is the manufacturer's active behavior. We have a lingering fear of the existence of the back door of the Apple phone, the router generally exists back door?

The so-called "back door" is actually the manufacturer in the research and development, testing, production process by remote to modify the product, and reserved in the product's small tail. This approach does bring convenience in the production process, reduce management costs, but the back door permanently left in the product.

  as long as the communication equipment, there must be a recognized unique code (such as MAC address), it means that users no matter where, as long as the network, it will be able to be found, or even controlled. of course, remote control is not easy to control, the premise is to know the manufacturer's set of rules, which is why the iphone although there is a backdoor, but no one can use the backdoor except Apple.

Of course, things in the domestic can be another matter, the Guangdong generation of manufacturing enterprises in the flow of people so frequently, it is inevitable that a small number of bad technical staff to rule after leaving another way. You know, the profit from selling information can be much higher than the wages of the factory.

To see how many routers in the market have left the back door? The answer is:90%.

  Wi-Fi password cracking: far more than by rubbing the net so simple

Just talked about so many loopholes, perhaps you will think: The most is the internet password is known, was rubbed net, also no big deal? OK, so ask a question, do you remember the first time you set up a router to surf the Internet? or quickly ask to help you set up the router that GG was then how to set.

Yes, the router into the network cable, the computer connected Wi-Fi, input "192.168.x.x" into the router's management interface ... Well, do you remember anything? If you can access the router's admin interface with Wi-Fi, anyone can get in without Wi-Fi.

You're not feeling nervous? So now to science, routers but like mobile phones, there is software system Yo! Also, the router's software system can be upgraded yo (the legendary brush machine)! There are also, hacker programs can be implanted with the software to upgrade the route yo!

So the reality is that the net = the router may be controlled by others = The system may be changed by others = may be implanted hacker program.

No sense of crisis yet? Go and search the next two days CCTV 315 party, to see more than 500 on-site audience connected to the hacker program of the router after what happened.

  Forgotten Route Management Password

People with a bit of experience with routers will know that there is no security between the Wi-Fi connection and the access to the router management interface, and the routing management password exists. Of course, most people in the real world will not set this password, or spent three years, still use factory default factory password, do not expect, not "guest" is "admin", and no the same.

Friends will use your mobile phone, so you will set a screensaver password, very good, you already have a certain sense of information security, but not enough! Remember, friends will use your Wi-Fi, the old king next door, may also rub your Wi-Fi, now enter the routing management interface to set a management password bar.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.