Jump to content

kennymccormick

Member
  • Posts

    7
  • Joined

  • Last visited

Awards

This user doesn't have any awards

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

kennymccormick's Achievements

  1. Most of the time the law states that you have to have broken some kind of layer of defense to be punishable (in my country it does). This could include brute force attacks or even just using default login information. I'm curious to whether it is illegal what happened with the Sonos devices, as I mentioned earlier I don't need any login information (so not even a default password) to get to the setup and control pages of my Sonos devices at home and all I have to do is type in it's IP. This means that if your port is open or your router is in bridge, there in theory is not a single layer of defense and you could in theory just control it by changing some URL's. Is this even hacking?
  2. Just found this guy's twitter: https://twitter.com/HackingMoth He posted a thread explaining the cause of the hack (not the hack itself though) and says that it's because people had open inbound ports (specifically 1400), listing their networks on the public internet. If that's true than it has nothing to do at all with cracking or default password or with how good your WiFi password is. I am just wondering if people unknowingly opened the ports themselves or if it was the Sonos device that did it using UpNp. I use Sonos myself aswel and tried to get into this configuration page he's talking about. It's damn easy, all I did was type in the Ipv4 of my Sonos device and adding :1400 to the adress in google chrome and I was shocked to see that I was into the setup page, listing all my connected devices and active speakers. There was no login page at all!? EDIT: I didn't find any open ports in my router that I didn't know of and port 1400 is closed so I highly doubt Sonos devices forward themselves.
  3. They did apparently. https://twitter.com/ronniehiggins/status/1071051359145779200
  4. Well it would be pretty embarrassing for Sonos if these devices created inbound firewall rules by themselves. I don't see any reason why this would be necessary.
  5. Yeah messing with GTA, printers or speakers is pretty innocent but when they start messing with government systems that would take it way too far.
  6. Apparently customers had ports forwarded in their router exposing the speakers to the public. I have Sonos devices at home too and the Sonos configuration interface is on port 1400 and requires no username or password thus leaving the system exposed if you have 1400 forwarded. I don't understand why people have these ports open.
  7. After hacking printers and GTA 5 worldwide, PewDiePie fans strike again. Misconfigured Networks Vulnerable to PewDiePie Prank They are pretty creative..
×