Penetration Testing mailing list archives
RE: RE: Pentesting a Web Applicaton
From: "Alex Balayan" <abalayan () b-sec com>
Date: Mon, 11 Jun 2007 14:51:18 +1000
Hi All, I started to follow this thread because I thought it was actually about pen testing a "web application" not a embedded device... I have found on some router devices that you can download the config files if you force browse to the full path of the config file. But I'm starting to see less of this because vendors are starting to secure the devices. Eg. http://path/to/config My 2 cents worth.... Regards, Alex Balayan - CE|H EnCE CEPT CCNA Senior Security Consultant Application Specialist Disclaimer: www.b-sec.com.au/disclaimer.txt -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of sherwyn.williams () gmail com Sent: Saturday, 2 June 2007 6:43 AM To: Jamie Riden; listbounce () securityfocus com; Stong, Ian C CTR DISA GIG-CS Cc: pen-test () securityfocus com Subject: Re: RE: Pentesting a Web Applicaton Agreed trying to get the password from the config is a good way to go. Maybe check on the vendor website or forun related to the product. Sherwyn Williams Technical Support The Williams Solutions -----Original Message----- From: "Jamie Riden" <jamie.riden () gmail com> Date: Fri, 1 Jun 2007 20:38:57 To:"Stong, Ian C CTR DISA GIG-CS" <Ian.Stong.ctr () disa mil> Cc:pen-test () securityfocus com Subject: Re: RE: Pentesting a Web Applicaton In that case the easiest attack might be against the config file. (Eek - my Netgear router stores the password in clear in its backup file!) cheers, Jamie On 01/06/07, Stong, Ian C CTR DISA GIG-CS <Ian.Stong.ctr () disa mil> wrote:
Just for clarification - I have backups of the configs and could reset the device and reload the config but as soon as you do that it also restores the password. In addition you can't change the password without knowing the old password.
-- Jamie Riden, CISSP / jamesr () europe com / jamie () honeynet org uk UK Honeynet Project: http://www.ukhoneynet.org/ ------------------------------------------------------------------------ This List Sponsored by: Cenzic Are you using SPI, Watchfire or WhiteHat? Consider getting clear vision with Cenzic See HOW Now with our 20/20 program! http://www.cenzic.com/c/2020 ------------------------------------------------------------------------ ------------------------------------------------------------------------ This List Sponsored by: Cenzic Are you using SPI, Watchfire or WhiteHat? Consider getting clear vision with Cenzic See HOW Now with our 20/20 program! http://www.cenzic.com/c/2020 ------------------------------------------------------------------------
Current thread:
- Re: Pentesting a Web Applicaton Haroon Meer (Jun 01)
- <Possible follow-ups>
- RE: Pentesting a Web Applicaton Stong, Ian C CTR DISA GIG-CS (Jun 01)
- Message not available
- RE: Pentesting a Web Applicaton Peter Wood (Jun 01)
- Message not available
- Re: Pentesting a Web Applicaton Jamie Riden (Jun 01)
- Re: Pentesting a Web Applicaton sherwyn . williams (Jun 01)
- Re: RE: Pentesting a Web Applicaton ebk_lists (Jun 01)
- RE: RE: Pentesting a Web Applicaton Stong, Ian C CTR DISA GIG-CS (Jun 01)
- Re: RE: Pentesting a Web Applicaton Jamie Riden (Jun 01)
- Re: RE: Pentesting a Web Applicaton sherwyn . williams (Jun 01)
- RE: RE: Pentesting a Web Applicaton Alex Balayan (Jun 11)
- RE: RE: Pentesting a Web Applicaton Stong, Ian C CTR DISA GIG-CS (Jun 01)
- Re: Pentesting a Web Applicaton Hylton Conacher (ZR1HPC) (Jun 04)