YoVDO

Exploiting ASUS DDNS to MITM Admin Credentials on One Million Routers

Offered By: Black Hat via YouTube

Tags

Network Security Courses Port Scanning Courses Man in The Middle Attacks Courses Internet of Things Security Courses Credential Theft Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical security vulnerability affecting approximately one million ASUS routers exposed to the internet via port 8443/tcp in this 30-minute Black Hat conference talk. Delve into the research conducted by Masaki Kubo, Yoshiki Mori, and Kanta Okugawa, which reveals how the "ASUS Router App" inadvertently alters router settings, making them accessible online. Discover the man-in-the-middle (MITM) attack vulnerability identified in routers configured with ASUS's DDNS, potentially allowing theft of admin credentials. Gain insights into the implications of this security flaw and learn about the researchers' findings on exploiting ASUS DDNS to compromise router security.

Syllabus

One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials


Taught by

Black Hat

Related Courses

Network Security
Rochester Institute of Technology via edX
Learn Network Hacking From Scratch (WiFi & Wired)
Udemy
Ethical Hacking With Python, JavaScript and Kali Linux
Udemy
Learn Ethical Hacking: Beginner to Advanced
Udemy
Ethical Hacking mit Python in der Praxis: Der Komplettkurs
Udemy