Linux - Wireless NetworkingThis forum is for the discussion of wireless networking in Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: Mandriva 2009 X86_64 suse 11.3 X86_64 Centos X86_64 Debian X86_64 Linux MInt 86_64 OS X
Posts: 2,369
Rep:
wireless modem routers
I read a article in the Newsientist that wireless modem router are
are very vulnerable to viruses So you have to keep the high security
specialy when you live in a city.
At this moment there no scanners to detect viruses in modem routers.
Even if you use linux to dwell on the webb you can pass to windows users.
Then how about listing the magazine and issue? Routers are a pretty varied breed of hardware, and to my way of thinking it wouldn't be trivial to execute external code on one unless the user is profoundly stupid and leaves all the factory defaults for passwords.
Distribution: Mandriva 2009 X86_64 suse 11.3 X86_64 Centos X86_64 Debian X86_64 Linux MInt 86_64 OS X
Posts: 2,369
Original Poster
Rep:
wireless modem routers
As far as I understand it all wireless modem are transmitting and
receiving and modems do have a memory If you don,t regulated the receiving
than it is possible to put a small program directly in the memory
As far as I understand it all wireless modem are transmitting and
receiving and modems do have a memory If you don,t regulated the receiving
than it is possible to put a small program directly in the memory
good luck
In short, no, that isn't possible. Wireless modems transmit and receive TCP/IP packets, which while they may contain code, are not executable code themselves. And while routers do contain memory, they don't really assemble the TCP/IP packets into their ultimate form, they just look at where that particular packet is supposed to go and send it on its way. The amount of time any packet spends in a router is pretty trivial.
To do what you're suggesting, a cracker would have to connect to the router (which can be prevented by using WPA encryption, or WEP if you're up against an incompetent cracker) and then actually crack the operating system on the router (which would be made more difficult by changing the default passwords). You can't do that just by sending packets, you would actually have to find a security hole in the OS on the router.
In my opinion (and I'm always capable of being wrong and why I'm interested in reading the article) what you're suggesting isn't really a worry. Yes, routers are computers, and like any other computer they can be cracked. But by taking normal precautions (WPA encryption of traffic and strong passwords on the router), just having a router working in its normal manner is really a pretty minimal security risk.
Thank you very much for posting that article. It makes an interesting read. However, it also points out what I suspected, namely that you're at risk only if you don't encrypt your traffic and if you leave the default passwords in place. In order for this kind of a worm to spread, the crack needs to gain administrative access to the router so they can flash the firmware with compromised code.
If you take even the most basic precautions, namely using WPA encryption and a non-obvious administrator password, you are pretty much invulnerable to this kind of attack. Heck, even WEP encryption with a decent password would probably keep the crackers out. The authors assume that WEP encyrption equals no protection, and for any given router, that is probably true. However, I'm not sure that someone is going to take the time to crack dozens upon dozens of WEP keys to pull off this kind of large-scale infection. I'm certainly no security expert, but from what I have read about large-scale infections, like those involved in creating bot nets, the crackers are relying on known vulnerabilities and more than a bit of phishing in order to crack their victims. In other words, the object seems to be to do as little work as possible to obtain victims. Because of this, I think the authors are probably overstating the contribution that WEP encrypted routers are contributing.
Still, this sort of nonsense is yet another reason why people should secure their wireless routers. As if they really needed another reason.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.