RSA conference shown how web page can take over your router


RSA conference shown how web page can take over your router

John-Paul Kamath

Security researchers will demonstrate how a web page can be armed to take control of network routers at today's RSA security conference.

Researcher Dan Kaminsky will show how browser flaws can be used to get hackers past corporate firewalls by compromising the Internet's Domain Name System (DNS).

At the root of web security is the same origin policy - where web pages run within a sandbox and are prevented from infecting other web pages. This allows most network equipment to communicate with each other only if they come from the same host name.

"But one name can be mapped via DNS to many IP addresses, some local and others not. The effect? You come to my webpage, and I can establish a VPN onto your LAN. And that's only the beginning," said Kaminsky.

The attack, called a DNS rebinding attack, would work on devices connected to a network, such as printers, that use a default password and a web-based admin interface, said Kaminsky, director of penetration testing with IOActive.

The victim would visit a web page trip wired with JavaScript to make the browser change settings on the web-based router admin page. The JavaScript could allow hackers to take remote control of the device, or force the router to download further software.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy