Wednesday, 25 November 2015

Router Penetration Testing



                   ROUTER PENETRATION TESTING


ROUTER PENETRATION TESTING
DESCRIPTION

In this post, we penetrate router to test DoS attack. The main objective of this post is to make the WiFi router more secure. So at the hacker and security perspective i am going to show you how to perform DoS on WiFi router and how to Secure it from these attacks.

TCP PORT SCANNING 

Before performing DoS attack, first task is to identify all the open ports. Here i am only showing the TCP ports.

Remember: When doing any testing of router. Don't forget to test UDP ports also. Because sometime UDP ports also reveal much information which is very helpful to craft further attacks.


TCP PORT SCAN 

WITHOUT DOS PROTECTION
Image 1: The following image shows that DoS protection is disabled on the router. On the right side the information is given for all security features present in this page. See the below image to understand more about it.

DOS PROTECTION DISABLED 

BEFORE ATTACK 
Now before moving directly to the attack, the below screenshot will display the scenario. On the right Kali Machine is the attacker from where we are going to perform DoS attack.
  • Below is the wireshark is running to see the packets travelling on the interface. 
  • And at last on the left, TP-Link service is running on the browser (port 80).
  • See the below image for more details:
ATTACKING NETWORK SCENARIO
ATTACK STARTED

Kali Machine: DoS attack is started using smurf6. It floods the target with ICMPv6 protocols.
Wireshark: On the Wireshark, observe flooding is going on which is enough to take the router down.
TP-LINK: At the back router web page is running.

See the below image for more details:


AFTER ATTACK 
  • After the successful attack, observe that router webpage is not available because the target is down. This attack is successful in this scenario when DoS protection is not enabled on the router.
  • See the below image for more details:
TARGET DOWN 

AFTER PROTECTION 
  • Now we are going to protect the router from DoS attack.
  • If you have TP-LINK Router and want to protect your router from DoS attack, check the security options as shown in the below image. See the below screenshot for more details: 
IMPLEMENTING DOS SECURITY

SAVE ROUTER SUCCESSFULLY 
  • After check all the security options, we can save our router with these attacks. The below screenshot shows after running the smurf6 attack, still the router is working.
  • See the below image for more details:




HOST IDENTIFICATION SECURITY 
  • It is a security that protects device from many attacks and host detection on the network. At this level we can put some security by isolating WiFi router.
  • Although it a small level of security, but useful to protect device sometimes.
  • Remember: Don't forget their are other ways to identify the host in the network.
BEFORE FORBID PING PACKET

Image 1: No security options is selected to isolate WiFi router from the network.

BEFORE SECURITY

Image 2: Using ping utility attacker can easily identify the remote host. See the below screenshot for more details:

BEFORE SECURITY: PING WORKING

AFTER APPLYING SECURITY

Image 1: After check the security options, see the Kali Machine, no response is coming from the target machine. This makes the router more secure for some level from  the different attacks. See the below screenshot for more details:

AFTER SECURITY: PING NOT RESPONDING 
SUMMARY 
  • In this post, we penetrate the TP-LINK wifi router at the DoS level.
  • Practically we perform DoS attack on the WiFi router. Which shows how we can take down the router and also how to protect it using TP-LINK security features.
  • Also we perform TCP scan using nmap (network mapper tool) to identify the target open ports at the very first of the post.
  • At the end, we also use TP-Link ping forbidden features, to make router security more harder atleast for some level.
  • If you are planning to purchase a TP-Link router or any other router always read the manual specially the security column. And buy a secure router which gives protections from these attacks.
  • One more thing at the last this target host is not mine. This whole testing done after bypassing authentication of the Wifi router. This shows that how vulnerable still our cities WiFi and what are the areas we all (Penetration testers or normal users)  have to focus to make router secure.

THIS ARTICLE IS JUST FOR EDUCATIONAL PURPOSES ONLY/- 

0 comments:

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts