期刊文献+

SOHO路由器脆弱性的分析和验证 被引量:2

Analysis and Verification of SOHO Routers Vulnerability
下载PDF
导出
摘要 SOHO路由器作为现今家庭和中小型办公环境中普及度极高的网络接入设备,其安全性之重要不言而喻。加之目前国内外对网络设备,尤其是路由器的攻击越发流行,因此,本文对SOHO路由器脆弱性和相应攻击面的研究具有重要价值,是相关学术领域研究的大势所趋。主要研究分析和归纳总结了SOHO路由器脆弱性方面的相关技术和研究成果,包括远程侦测技术、漏洞利用技术和后门驻留技术等。首先是远程侦测技术,用来实现对路由器类型和版本的精准探测;其次是漏洞利用技术,用来获取路由器的管理权限甚至是系统权限;最后是后门驻留技术,用来在获取路由器权限的基础上实现长期的隐蔽控制。这里为今后在设计、改进SOHO路由器的安全防御技术和策略等方面提供基础支撑。 As a network access facility, the SOHO router is highly popular in family and office today, so it' s security is of great im- portance. Nowadays cyber attack aiming at network equipment, especially SOHO touters, is gradually popular at home and abroad, so it is necessary to research on vulnerabilities and attacking methods, and also it is represents the general trend in the related research fields. This paper focuses on researching and concluding both the technologies and results about the SOHO router' s vulnerabilities, in- cluding remote detection technology, exploit technology, and resident backdoor technology. Firstly, the remote detection technology, which is used to accurately detect router' s type and version, is studied. Then, exploit technology is researched to get administrator privileges, even get the system authority. Finally, resident backdoor technology is is used as controlling the router covertly in a long- term based on getting the administrator privilege. This paper may provide basis SOHO router' s support in the both design and improve- ment of security techniques and strategy in the future.
出处 《信息安全与通信保密》 2016年第8期95-100,共6页 Information Security and Communications Privacy
关键词 SOHO路由器 远程侦测 漏洞利用 后门驻留 脆弱性分析 SOHO router remote detection exploit resident backdoor analysis of vulnerability
  • 相关文献

参考文献19

  • 1Cui A, Costello M, Stolfo S J. When Firmware Modifications Attack: A Case Study of Embedded Exploitation[ C]//Net- work and Distributed System Security Symposium. San Diego, CA United States:lSOC, 2013:24-27.
  • 2隋新.主机特征信息被动识别的研究与实现[J].科学技术与工程,2013,21(3):652-658. 被引量:13
  • 3王永杰,鲜明,王国玉,肖顺平.基于指纹分析的Web服务探测技术[J].计算机工程,2005,31(17):26-28. 被引量:5
  • 4Bates R,Istance H.Zooming interfaces!: Enhancing the Perform- ante of Eye Contrtlled Pointing Devices [ C ]//Proeeedings of the Fifth International ACM Conference on Assistive Technologies. Edinburgh, United Kingdom :ACM, 2002:119-126.
  • 5刘永磊,金志刚.WEP协议攻击方法研究[J].计算机工程,2010,36(22):153-154. 被引量:5
  • 6Gold S. Crac king Wireless Networks [ J ]. Network Security, 2011 (ll) :14-18.
  • 7Zisiadis D, Kopsidas S, Varalis A. Enhancing WPS Security [C ] //IFIP Networking. Prague, Czech Republic: IEEE, 2012:21-23.
  • 8吴明峰,张永胜,李园园,韩艳梅.Web服务攻击技术研究[J].计算机技术与发展,2012,22(1):213-216. 被引量:6
  • 9Craig. Exploiting Embedded Systems[ EB/OL]. 2011 [ 2016-06-12]. http ://www.devttysO.com/2011/09/exploiting-em- bedded-systems-part-2/.
  • 10Exploit D B. D-Link DSR Router Series - Remote Root Shell Exploit[ EB/OL]. 2012[ 2016-06-18 ]. https ://www.exploit - db.com/exploits/30062/.

二级参考文献84

共引文献24

同被引文献11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部