Popular in Course
verified elite notetaker
Popular in Department
This 0 page Study Guide was uploaded by kimwood Notetaker on Monday November 9, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 15 views.
Reviews for ISSC363_Assignment_5
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/09/15
WIRELESS VULNERAB ILITY Security Hacking Brian Page American Military University WIRELESS VULNERAB ILITY 2 Introduction There will always be vulnerabilities and exploits that allow blackhat hackers into systems and hardware Hacking is basically people attempting to prove that they can make hardware or software do something that it is not supposed to be able to do Take for example people putting Linux on ten to fifteen PlayStation 3 s and making them into a supercomputer The security controls on the machines themselves are cracked into and changed to allow this to happed for which Sony has said is not supposed to be possible Widespread Vulnerability The WiFi router and modem combo device that your cable provider sold to you may have a vulnerability in it that you don t know about Many of the top brands of combined wireless modems routers have been affected by a vulnerability that will allow a malicious attacker to gain control of your network There are approximately nine Cisco home products that are used in the proprietary market vulnerable to remote attackers in a way that which would allow them to root access The modems combine the functionality of a cable modem and a router in one Updates to the firmware that mitigate the vulnerability have been released It is not safe to assume that you are safe if the only thing you do to secure your network is setup the default security settings Most routers come preconfigures using the DHCP address assignment of 19216811 Changing this setting could help prevent unauthorized access to your equipment Most users do not have the knowhow to accomplish a firmware update on the devices and are finding it rather difficult The vulnerability exists whether the device is configured as a gateway or a router The devices affected have been used by cable and internet service providers as standard supplied devices for their customers If the device is still under a factory warranty or WIRELESS VULNERAB ILITY 3 contract with the service provider the patch can be obtained through the them if not customers are being instructed to call Cisco technical Support for instructions on how to patch the vulnerability The aw received the highest criticality rating 100 on the Common Vulnerability Scoring System CVSS which means it can completely compromise the confidentiality integrity and availability of the targeted device PCWorld The products that Cisco manufactured with the vulnerability range from VOIP devices and Cable modems to Wireless Residential Gateways The vulnerability is caused when a malicious attacker polls HTTP requests to the webserver of the Gateway or modem that crashes the webserver Vulnerabilities exist in every piece of hardware or software that is made the key is whether or not they are found and exploitable Cisco is one of the leading manufacturers of home and business hardware Routers switches wireless routers and gateways are just to name a few The individuals that test for and explore these vulnerabilities are whitehat or ethical hackers whereas the individuals that exploit the vulnerabilities for personal or financial gain sabotage or data theft are called blackhat hackers WIRELESS VULNERAB ILITY 4 References Cited Vulnerability exposes some Cisco home Wireless devices to hacking 2014 July 18 Retrieved November 7 2014 from httpWWWpcworldcomarticle2455400vu1nerabi1ityexposes someciscohomeWirelessdevicestohackinghtn
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'