Font Size: a A A

Research On Security Detection And Optimization Configuration Of Wireless Routers

Posted on:2018-11-15Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2358330536988532Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless router has become an indispensable network equipment in people's daily life,a large number of wireless routers are deployed in the home and commercial environment,in order for user to connect Wi-Fi Internet conveniently.In recent years for the wireless router vulnerabilities have entered the field of view,the attacker can use the vulnerability to obtain part of the wireless router authority to steal the user's information and property,the network security has a serious threat.Based on the current security situation of ordinary users of knowing little about wireless routers,this article will introduce a simple and convenient wireless router security testing tool SafeAP,can help users to quickly detect the potential vulnerabilities in current connection by wireless routers.This tool has been applied to each big mobile phone shopping online,the users can download and install.The tool can easily get the basis of the data and information in the current connection by wireless routers,detect the potential vulnerabilities in the wireless routers through the cloud server,users can also through the test results of wireless routers for further optimization and configuration.Users download and use the wireless router security test tool SafeAP,the test results will be uploaded to the cloud server through the network,the current cloud server has been collected more than 2000 data,through the analysis of these data,the wireless router vulnerabilities were classified into four Part: the router password crack vulnerability,router Web vulnerability,router backdoor vulnerability and router overflow vulnerability.By analyzing the cloud server-side data statistics,found that wireless router overflow vulnerability accounted for as high as 62.7%,widely exist in people's daily use of wireless routers,the user's network security threats the most.Based on the existing methods of firmware vulnerability analysis,this paper analyzes the real function of the hedge of the hedwig.cgi buffer overflow in the D-Link firmware,extracts the characteristics of the vulnerability function,and the similarity of the feature To determine the degree of correlation between the hedge of the hedwig.cgi buffer overflow in the D-Link family.Finally,the optimal allocation method of hedwig.cgi buffer overflow vulnerability for D-Link brand firmware DIR-645,DIR-815,DIR-300 and DIR-600 is proposed by analyzing the principle of hedwig.cgi buffer overflow vulnerability.
Keywords/Search Tags:Vulnerability detection, Router overflow vulnerability, The firmware vulnerability correlation analysis, Similarity of function feature
PDF Full Text Request
Related items