Title :
The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks
Author :
Stasinopoulos, Anastasios ; Ntantogian, Christoforos ; Xenakis, Christos
Author_Institution :
Dept. of Digital Syst., Univ. of Piraeus, Piraeus, Greece
Abstract :
ADSL routers are an integral part of today´s home and small office networks. Typically, these devices are provided by a user´s ISP and are, usually, managed by people who do not have any special technical knowledge. Often poorly configured and vulnerable, such devices are an easy target for network-based attacks, allowing cyber-criminals to quickly and easily gain control over a network. In this paper, we systematically evaluate the security of ADSL routers and identify the potential of attacks, which attempt to compromise the vulnerabilities of their web interface. More specifically, we present common vulnerabilities and attacks that occur in websites on the Internet, and project them on the special characteristics of the web management interface of ADSL routers. To put this analysis into a practical context, we investigate the security of a popular ADSL router provided by a Greek ISP. In this security assessment, we have discovered two 0-day vulnerabilities in the web management interface of the tested router. In particular, we discovered an operating system (OS) command injection and stored Cross-Site Scripting (XSS) attack. A malicious may exploit these vulnerabilities to perform several large-scale attacks. Specifically, he/she can perform DNS hijacking attack and redirect the users to fake web sites for phishing; mount a Distributed Denial of Service (DDoS) attack using the compromised routers as zombie machines; or even spread a malware. Finally, we discuss some well-known security practices that should be followed from developers and users to enhance the security of ADSL routers.
Keywords :
Internet; digital subscriber lines; telecommunication network routing; telecommunication security; ADSL router security; DDoS attack; DNS hijacking attack; Greek ISP; Internet service providers; OS command injection; Web interface; Web management interface; Web sites; XSS attack; asymmetric digital subscriber line; cross-site scripting attack; cyber-attacks; distributed denial-of-service attack; home networks; malware; network-based attacks; operating system; security assessment; security practices; small office networks; zombie machines; Broadband communication; Chaos; Operating systems; Testing; ADSL routers; DNS hijacking; XSS; command injection; phishing; web interface vulnerabilities;
Conference_Titel :
Signal Processing and Information Technology(ISSPIT), 2013 IEEE International Symposium on
Conference_Location :
Athens
DOI :
10.1109/ISSPIT.2013.6781868