Translate

Archives

Image of Linux Kernel Development (3rd Edition)
Image of Android Wireless Application Development
Image of Advanced Programming in the UNIX Environment, Second Edition (Addison-Wesley Professional Computing Series)
Image of XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)

Decrypt PROLiNK ADSL Modem Configuration File To Reveal Backdoor

In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings.