During the MikroTik router hack, attackers were able to bypass authentication and reset the devices' packet sniffing configurations to redirect traffic to specific locations by modifying a request to change one byte related to a session ID. In the MikroTik router hack, attackers were able to modify a device's packet sniffing setting in order to forward data to the desired locations - the vulnerability in Winbox for MikroTik RouterOS enabled remote attackers to gain control of vulnerable MikroTik routers in Russia, Iran, Brazil, India and Ukraine. Researchers at the Chinese cybersecurity company Qihoo 360 Netlab reported that more than 7,500 MikroTik routers worldwide were sending their TZSP sniffer traffic to 10 attacker-controlled IP addresses - one address was taken out of service after the initial research was released. UDP is used to deliver data packets faster than could be done with the TCP because it does not guarantee delivery of the packets transmitted, nor does it guarantee that packets will be delivered in the order in which they were sent. This encapsulation protocol is used to capture 802.11 wireless packets to support intrusion detection systems, such as Snort protocol analyzers, such as Wireshark wireless tracking and other wireless applications. The TaZmen Sniffer Protocol (TZSP) is an open protocol designed to encapsulate other protocols over the User Datagram Protocol (UDP).
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |