You can tell if they're running old firmware revs (the one that lets in both udp and tcp for instance) because it will give you the "beaker" gif on port 80 on the outside. I kinda miss the "beaker" gif... :-) There may be other fun possible on these that I haven't explored fully yet, but since I use them in a few places I'm not going to be too forthcoming on a public list. :-) E-mail me offline if you are stuck and you absolutely need to crack one and are willing to spend some dev time on it. --dr P.s. has anyone poked hard at their SNMP? On Wednesday 20 June 2001 18:11, Nexus wrote: > I use the BEFRS41 (DSL jobbie) myself (play nicely children) but prior to > that, me and some of the lads took it into a dark room and gave it a good > kicking. Seems pretty robust IMHO. The only issue I found with it was > when logging traffic, it would stop logging if the activity got too high. > But I use ummmm.... alternative logging methods ;-) > Not sure if it has already been mentioned, but the web admin is disabled > from the internet by default and doesn't listen on anything else by default > (no SNMP, telnet etc) and can do egress as well as ingress filtering, NAT, > port forwarding and the like. > Not knowing the version you are looking at makes it difficult to add more. > Besides, if you are on the internal net, who gives a toss about the > firewall ? :) > > Cheers. > > ----- Original Message ----- > From: "NetW3.COM Consulting" <netw3at_private> > To: <PEN-TESTat_private>; <markat_private> > Sent: Wednesday, June 20, 2001 7:22 AM > Subject: RE: Linksys Pen Test > > > Which model of Linksys are you working with and what type of netowrk > > environment? One of my clients uses a Linksys DSL router, and the > > default authentication is admin/admin unless changed manually. This is a > > model BEFRsomething (can't remember the number off the top of my head). > > > > I've not tried to pen test the device, but I imagine if you could get > > to the internal network you could open up a web browser admin session > > to the device (found by traceroute to the outside, of course, or > > on the default address 192.168.1.1 as you said). > > > > Curt Wilson
This archive was generated by hypermail 2b30 : Thu Jun 21 2001 - 15:29:46 PDT