Router hacking competition announced for Defcon

By on
Router hacking competition announced for Defcon

Compelling manufacturers to lift their game.

Well-known manufacturers of residential and SME wireless routers will have reason to feel nervous as hackers at the annual DefCon security conference aim to break into their products to find undocumented vulnerabilities or so-called zero days.

The sponsors behind the DefCon SOHOpelessly Broken competition, Independent Security Evalutators and digital rights lobby group Electronic Frontier Foundation, are confident the hackers will find vulnerabilities, as a number of router vendors have been accused of carelessness in security in the past.

study by ISE of 13 SOHO (small office/home office) routers found all to be vulnerable in one form or other. Of the routers in the study, 11 could be taken over remotely, and in two cases, no active management session was required.

ISE and EFF hope to create awareness of what they said is poor security across billions of SOHO devices around the world..

Despite abundant research and evidence that SOHO devices are highly vulnerable to malicious compromise, the vulnerable trends continue. From shotty code to blatant backdoors, the excitement never seems to end — though we'd like it to. Our hope is that this contest sheds light on the need for manufacturers to better secure these devices by shining a spotlight on them.

- SOHOpelessly Broken motivation statement.

Routers from Linksys, ASUS, TRENDnet, Netgear, TP-Link, D-Link and Belkin will be used for the competition, each with a specific firmware version. In addition, EFF's forthcoming Open Wireless Router could also be at the hackers' mercy.

A top score of 5000 points will be awarded for obtaining full control of the router, with a partial take-over rewarded with 4000 points. Points are deducted if the zero day is not a remote attack, requires human interaction, passwords or authenticated sessions among other things.

SOHOpelessly Broken adheres to a strict responsible disclosure policy, and affected vendors will be notified of vulnerabilities prior to these being demonstrated.

Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

New Windows 10 users, are you upgrading from...
Windows 8
Windows 7
Windows XP
Another operating system
Windows Vista
How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?