Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting ASUS DDNS to MITM Admin Credentials on One Million Routers

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical security vulnerability affecting approximately one million ASUS routers exposed to the internet via port 8443/tcp in this 30-minute Black Hat conference talk. Delve into the research conducted by Masaki Kubo, Yoshiki Mori, and Kanta Okugawa, which reveals how the "ASUS Router App" inadvertently alters router settings, making them accessible online. Discover the man-in-the-middle (MITM) attack vulnerability identified in routers configured with ASUS's DDNS, potentially allowing theft of admin credentials. Gain insights into the implications of this security flaw and learn about the researchers' findings on exploiting ASUS DDNS to compromise router security.

Syllabus

One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials

Taught by

Black Hat

Reviews

Start your review of Exploiting ASUS DDNS to MITM Admin Credentials on One Million Routers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.