Translate

Image of Advanced Programming in the UNIX Environment, Second Edition (Addison-Wesley Professional Computing Series)
Image of Modern Operating Systems (3rd Edition)
Image of Operating System Concepts
Image of Linux Kernel Development (3rd Edition)

Decrypt PROLiNK ADSL Modem Configuration File To Reveal Backdoor

In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings.