Image of Operating System Concepts
Image of Linux Kernel Development (3rd Edition)
Image of Advanced Programming in the UNIX Environment, Second Edition (Addison-Wesley Professional Computing Series)
Image of Modern Operating Systems (3rd Edition)

Decrypt PROLiNK ADSL Modem Configuration File To Reveal Backdoor

In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings.