What's new

Password length

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Sure. I really do not want to turn this thread into a side-bar on security but I think since we're talking about security on the local lan not mattering, I think its worth one more post.

Here are some ways:
https://conference.hitb.org/hitbsec...ning Your Surveillance Camera Against You.pdf
http://www.slideshare.net/Synack/internet-of-things-51400317

Many of these devices are exposed to the internet. They run linux or a culinux or similar. They don't provide much protection to replacing their firmwares once compromised. They, if they are exposed, are your weak link. Some come with UPNP ON by default as well to make it nice and ease for a home user to operate.

An example hack:
One hack would be to compromise a low security device and place a reverse proxy on that device. The person wouldn't even know they are hacked. They can now use that proxy to have network access through your router to that device that was exposed to the internet through a legitamite port forward. SPI/NAT doesn't protect anything because the packets are being routed legitamitely. You told it to port forward that device. Since a hacker can now proxy through that device to your local network, they can now logon to your router with that 'password' password and replace your router firmware or set up their own policies on the router. Again, not that hard. We can grab a build right from this site and compile whatever I want into the firmware and upload it. Now I no longer need that reverse proxy and I can use your router to have permanent access including disabling the ability to update the firmware of that router. If you want an example or many examples of this, PM me and I'm happy to give you some.

The problem is NOT your router as they are built for security. It is usually other lower security devices people do not consider a threat if compromised. "Who cares if someone can see my front lawn from my outside security camera, so i'll just open a port to it and leave the password as 'admin' ". Even if they do change their password, most of these devices have ZERO protection against brute force dictionary attacks and most people use weak passwords. Once they are on the local lan, yes you are already compromised but why give them EVEN MORE access to EVEN MORE devices that control EVERYTHING on your network like your router.

To your other question of "why" would someone want to do this? A few real examples come to mind:
Snowden and compromise of SIM cards. It's in the news. Google it. The attack against the company started with profiling their engineers/staff. They did this by gathering personal communication data from those people (easy to gather if i'm on your local lan). If you work for a company and someone sees you as a target for social engineering then you're a target from a far away land.
Or how about some pervert that wants to view your webcams.
Or Botnet or as decoy sources in a targeted attack against other more critical targets (corporations, small / large businesses).

I'm not trying to be rude or paint the picture of a boogey man. Hacks do happen. It isn't only against corporations. Soft targets can aid in higher level attacks. If you would like to discuss further, start a PM thread.
 
If you can't deny router access (not remote network access ... two different things) over the internet via a simple setting, then buy a new router today.

Anyone sitting outside your door with a laptop and some software tools can have a shot at cracking your WPA2 key, and potentially gain LAN access.

That's in addition to malicious websites that can use a wide array of security holes to compromise a computer, brute force their way into your router, and install malware on it. Look at the various reports of router-based botnets of the past few years caused by weak/default router login credentials. DNS hijacking. And so on...

That does not mean you need a completely random 16 characters password to secure a home gateway, but anything reasonably secure should be used, rather than "password" or "admin".
 
For me external access to router over WAN is a standard option, therefore password is a very important thing for me.
Of course disabling this, as well switching off wifi is a most secure strategy, but let's stay serious.

I will contact Asus if it helps. Thank you.
 
I will contact Asus if it helps. Thank you.

While you're at it, pls also ask Asus not to store your password in plaintext on the router.

At least shall have standard linux encryption, if not something better..
 
anything reasonably secure should be used, rather than "password" or "admin".

Merlin, I think the default password for "admin" is "admin" in Samba on 378.55. No way users can change it through GUI..

If people want some pranks on your friends, be quick.:)
 
If your router is plugged into the wan port to an isp, it is externally exposed. I wasn't referring to exposing the asus UI externally either. I am referring to breaches through hacking of less secure devices. If you think it doesn't happen, you're mistaken.

Sorry but advice to set your router password to "password" isn't sound.

Makes a good point - sometimes it's not the strength of the key, but the strength of the door itself - we have seen many vulnerabilities out there that can totally bypass any reasonable password on an Admin GUI... my advice would be to never expose a Router/AP or NAS GUI to the internet at large (or Web Cams for that matter), as the risk is just too high...

Going back to OP - it would be nice to see longer PW's, but at the same time, reasonably strong PW's can be used in the 12-16 character space...

tooGhief3ool
- reasonably strong - no rainbow tables (until now probably)
Eev3Eefu4bae8ahw - even stronger yet - btw, I wouldn't use either one of these now, but generally speaking, 12 to 16 characters is good enough

Again however, no matter how strong the key is, it's the security behind it that is really important.
 
While you're at it, pls also ask Asus not to store your password in plaintext on the router.

At least shall have standard linux encryption, if not something better..

Would be awesome if it used PAM...
 
Merlin, I think the default password for "admin" is "admin" in Samba on 378.55. No way users can change it through GUI..

If people want some pranks on your friends, be quick.:)

Samba uses the same user as configured for the router. So once you change your router login to a different password, it will get used by Samba.
 
Samba uses the same user as configured for the router. So once you change your router login to a different password, it will get used by Samba.

Apparently you're right. I should have had tried Administration > System page..

It was a while back when I updated to 378.55. Changed my login password through Quick Internet Setup as usual. At a much later time, realised admin stayed at admin for Samba. I checked nvram variables and saw this inconsistent state.
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top