lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040604181716.28437.qmail@www.securityfocus.com>
Date: 4 Jun 2004 18:17:16 -0000
From: Jerry Zwanenburg <J.Zwanenburg@...llo.nl>
To: bugtraq@...urityfocus.com
Subject: Re: LinkSys WRT54G administration page availble to WAN


In-Reply-To: <019201c4494b$9a3c1460$476ffc50@...a>

Peter,

I agree on that.

For the external loggin. Look at www.wallwatcher.com.
Its a great free tool written for linksys.

Cheers,
Jerry


>Received: (qmail 11131 invoked from network); 3 Jun 2004 19:57:09 -0000
>Received: from outgoing.securityfocus.com (HELO outgoing3.securityfocus.com) (205.206.231.27)
>  by mail.securityfocus.com with SMTP; 3 Jun 2004 19:57:09 -0000
>Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
>	by outgoing3.securityfocus.com (Postfix) with QMQP
>	id D892B236FD2; Thu,  3 Jun 2004 18:43:34 -0600 (MDT)
>Mailing-List: contact bugtraq-help@...urityfocus.com; run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@...urityfocus.com>
>List-Help: <mailto:bugtraq-help@...urityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@...urityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@...urityfocus.com>
>Delivered-To: mailing list bugtraq@...urityfocus.com
>Delivered-To: moderator for bugtraq@...urityfocus.com
>Received: (qmail 1667 invoked from network); 3 Jun 2004 03:04:23 -0000
>Message-ID: <019201c4494b$9a3c1460$476ffc50@...a>
>From: "Peter Becker" <peter.becker@...rkassel.de>
>To: <bugtraq@...urityfocus.com>
>References: <C0BEC2592902BF45B8777C49B1F2A08C5485FA@...es2.dom1.jhuapl.edu>
>Subject: Re: LinkSys WRT54G administration page availble to WAN
>Date: Thu, 3 Jun 2004 11:17:27 +0200
>MIME-Version: 1.0
>Content-Type: text/plain;
>	charset="iso-8859-1"
>Content-Transfer-Encoding: 7bit
>X-Priority: 3
>X-MSMail-Priority: Normal
>X-Mailer: Microsoft Outlook Express 6.00.2800.1409
>X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1409
>
>> I have a WRT54G at home.  After seeing all the discussion here about the
>> remote administration vulnerability I tried to access the web interface
>> today on ports 80 and 443 from outside of my home network and was not able
>> to get to the web interface either.
>>
>> But, having said that, I'm still fairly disappointed with this product.
>> Linksys used to incorporate SNMP support that made it possible to use
>> Linklogger, a very inexpensive and capable firewall logger.  But, it
>appears
>> that SNMP and syslog support are gone.  I contacted tech support about
>this
>> and they agreed that the WRT54G has no support for external event logging.
>> Too bad.
>
>There are several other firmwares for this product.
>I use OpenWRT this is realy great.
>I don't know, if the other firmware makes it possible to external event log,
>but you could make nfs-mounts so you could write the eventlog on a
>network-share.
>
>To the issue:
>I tested the original firmware before flashing.
>And I also wasn't able to access the webinterface from the wan-port.
>I've got hardware revision 2.
>
>
>Peter
>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ