Free Router Password Recovery Software Publisher DescriptionRouter Password Kracker is a Free tool to quickly recover lost password from Router, Internet Modem or Website protected with HTTP BASIC Authentication.Whenever you try to access the Router/Modem from the browser (typically you will be prompted to enter username & password. Losing this password means you will not be able to access your Router/Modem. In such cases, 'Router Password Kracker' can help you in recovering the password.Also Penetration Testers and Forensic Investigators can find this tool very handy in cracking the Router/Modem/Website password.It uses Dictionary crack method and includes sample password dictionary file.
Whether in your home or office, an unsecured Wi-Fi router running on the default. Getting rid of the problems caused by hackers cracking the radio-waves.
Further ReadingWhile the vulnerability isn't as serious as those that allow, it's nonetheless concerning. People with administrative control can reroute everyone connected to malicious websites and possibly install alternate or even malicious firmware updates.' I trust people that join my network to some degree, but I don't want them to be able to reconfigure the router,' Joshua Drake, research director at Accuvant and the person who, told Ars. 'I can't prevent them without this getting fixed (short of the workaround).' The vulnerability stems from a poorly coded service known as infosvr, which monitors the local area network for other connected routers. Infosvr runs with unfettered root privileges and contains an unauthenticated command execution bug. The result: anyone connected to the local network can gain control by sending a single packet to the router.
Drake said virtually all are susceptible. He said testing showed firmware version 3.0.0.376.2524-g0013f52 was vulnerable, but he assumes all other versions are also affected. The bug has been designated CVE-2014- 100009583.Unless Asus releases a patch, there's little non-technical users can do to close the hole. More technically inclined people can use the vulnerability itself to turn off infosvr after each reboot. They can use the following command to do so.
If you trust someone to be on your network as a full access user. Why then is this such a big deal. Many devices on a network default to sharing and linking at least minimally together anyway. Much of the Asus line of routers are consumer driven anyway. I would be surprised if any sensitive business is using these types of routers.
But even so, most should know who is using their local network and have a password on it. I guess its worthy note for a article but I doubt many will be so concerned about it.I call this type of post the 'I live alone' post.I have secured my wireless network as much as I reasonably can from outsiders.
But one time I let a friend from out of town stay with me with his wife and three kids. Within 5 seconds of coming in the door, the first thing the kids wanted to do was get their devices back onto the Internet, and naturally I couldn't say 'You can't use my wifi.' One of them is a technically savvy teenager. Sometimes it's difficult to deny certain people access to my LAN like that teenager, or like my brother, who I know could totally mess with certain wide-open (no password even possible for like my AV receiver) IP-accessible devices on my LAN if they wanted to. Those devices might not be mission critical, but the one that is, is my router, and I would not want some of these not-100%-trustworthy users to get into it via this vulnerability. (I know you can get around some of this if your router has a separate guest network.)And of course your post doesn't address the 'public hotspot' use case mentioned in the article at all.1149 posts registered Oct 17, 2008.