Solved

need info about network address translation (exploits, security, information)

Posted on 2003-11-11
5
702 Views
Last Modified: 2010-04-11
ok here's what i need which i find hard to come by. i need reading material on how bypass regular home nat routers, software to prevent such a thing for happening, known and reported exploits for commerical home routers like soho and linksys routers.
and it's very important that all information also has a way of blocking or security against such an exploit or hole.
knowing how to do it is great, guarding against it is even better. knowing both gives me best all around security! :-)

so if anyone wants to help. just link me to some reading material. the more the merrier :-D
0
Comment
Question by:zero01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 120 total points
ID: 9723174
Can't help you with providing any type of exploits but will help you with security information as it pertains to protecting your home networks while using the above mentioned equipment.

Here is a some for Linksys:

Linksys Routers Found to be Vulnerable to SNMP Issues
http://www.securiteam.com/securitynews/5AP0G0A61Y.html

Linksys Router Flaw Reported
http://www.pcworld.com/news/article/0,aid,106632,00.asp

Linksys Response to Alleged Security Vulnerability on its BEFSR41 Router
http://www.linksys.com/splash/presentation.asp

Soho:

http://www.knowledgestorm.com/ActivityServlet?ksAction=optInReq&solId=58650&pos=1&referer=SEARCH_RESULTS&trkpg=search_results_viewdetail

SOHO Security Solutions
http://www.networkcomputing.com/1106/1106ws2.html

SOHO Security
http://www.extremetech.com/print_article/0,3998,a%3D23325,00.asp

SOHO Security Downloads
http://www.securityworm.com/software/soho/

Have Fun
0
 
LVL 1

Author Comment

by:zero01
ID: 9728889
cool thanks. hey that's all i wanted. nothing illegal or anything. just documented flaws, security info, stuff like that.
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 9730978
No problem, just have to be careful how you word things in the ole security area less you want the annoyance of big brother intervention.
0
 
LVL 1

Author Comment

by:zero01
ID: 9730994
yes i know. lol. i just wish i could ask alot more "in depth" question about computer security. not cus i wanna be a bad ass and destroy company files or hack school computers but, i'm currently a college student. and i'm trying to get into the programming/security business. and although i do know a little about hacking some computers, i know next to nothing compared with what i should know if i wanna be a network security specialist. or start a computer security business, or anything along those lines.
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 9731047
My suggestion to you then is to read, read, read. Something you’re probably used to if you’re still in school. Security consulting is more about telling others what they should do then actually doing it yourself. Not that you shouldn't know how to do it yourself it's just not as important as knowing. Most of the security work that I have done is simply writing documents on how things should be configured and conducting meetings that increase awareness. The staff of the company that I consult for actually puts those changes and recommendations into effect.

I also have a small lab at the house where I practice doing certain things and playing with certain toolzs as well. This will give you a much deeper understanding on not only what it takes to hack but most importantly what it takes to prevent it from happening to your client’s computers and networks.
 
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question