From: Neil Moore (neil@droopy.com)
Date: Wed Jun 01 2005 - 19:47:20 EDT
Opening all the ports inward bound to the clients real IP address and
scanning them for vulnerabilities would be my next step in a pentest.
-Neil Moore CCIE #10044 (R&S/Security/Service Provider)
On Wed, 1 Jun 2005, Sherwyn Williams wrote:
> This might be a dumb question but here goes!
>
> once someone gets access to a say linksys for instance apart from setting
> up remote access to the router, or getting the clients real ipaddress, what
> else can someone do. I am doing a pentest, and I want to show what are some
> of the ways that someone can use the router acess to the advantage.
>
>
>
> Sherwyn Williams
> Technical Consultant
> (917) 650-5139
> Sherwill22@tmail.com
>
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:22 EDT