Back to Results
First PageMeta Content
Network architecture / DNS rebinding / Cross-site request forgery / Dynamic Host Configuration Protocol / Denial-of-service attack / Proxy server / Internet protocol suite / Router / Firewall / Computing / Computer network security / Internet


Remote Attacks Against SOHO Routers 08 February, 2010 Craig Heffner Abstract This paper will describe how many consumer (SOHO) routers can be exploited via DNS re-binding to
Add to Reading List

Open Document

File Size: 1,16 MB

Share Result on Facebook

Company

Dell / /

/

IndustryTerm

Web interface / Internet connections / target router / exploit Web page / cross-site / Web servers / internal Web interface / proxy server / Web browsers / Web browser / internal-facing Web / Web server / public Web server first / eth0 network / Internet Explorer / /

OperatingSystem

Linux / PFSense / /

Organization

Stanford / /

Person

David Bryne / Rebind / /

Position

model / IP address / domain registrar / /

ProgrammingLanguage

JavaScript / HTML / /

Technology

Confirmed affected routers / LAN / Remote Attacks Against SOHO Routers / load balancing / DNS / proxy server / firewall / Linux / SOHO routers / ISP / HTTP / caching / HTML / WAN / TCP/IP / target router / Web server / /

URL

ns1.attacker.com / attacker.com / /

SocialTag