Translate

Archives

Image of Advanced Programming in the UNIX Environment, Second Edition (Addison-Wesley Professional Computing Series)
Image of XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)
Image of Modern Operating Systems (3rd Edition)
Image of Android Wireless Application Development

Decrypt PROLiNK ADSL Modem Configuration File To Reveal Backdoor

In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings.