Home routers are key elements of our home network infrastructure. In this event, we will present some methods on how to protect and attack home routers. With that done we invite everyone for brainstorming.
WHERE: EPAM Office, O3 Business Campus, Opolska 114, Krakow
WHEN: 6.00PM, March 04
REGISTRATION IS MANDATORY: https://community-z.com/events/protecting-the-home-router
6.00 PM – Registration
6.10 PM – "Security hardening of home routers" - Slawomir Hess
6.40 PM – “Router password issue” – Filipi Pires
7.10 PM – Break
7.25 PM – Brainstorming
You can’t come to the office? No worries – join the ONLINE STREAM of the event. How to do it?
Step 1 - open this website: https://community-z.com/events/protecting-the-home-router
Step 2 - register for the event
Step 3 - press “JOIN ONLINE” button
Step 4 – register via GoToTraining.com
Step 5 - listen carefully and enjoy live streaming (optional to use)
“Security hardening of home routers” – Slawomir Hess
The home router is a key component of our home network infrastructure. How can we protect it? How to benefit its security features? What security controls can we enable and how? What advanced security can we apply to our home router?
“Router password issue” – Filipi Pires
I'll show the simple explointation in Router and I get a CVE[masked] (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19967)
This is a Proof of Concept on how to get the Connect Box DOCSIS 3.0 router admin credentials when sniffing the HTTP traffic packets.
Using Wireshark for packet capture and a Firefox browser to access the router management panel, it was possible to realize that admin credentials.
This event is organized by EPAM Cyber Security PL Community:
The participation is FREE of charge.
See you at the event!