researcher accidentally finds 0-day affecting his entire internet service provider

Поділитися
Вставка
  • Опубліковано 10 чер 2024
  • This is truly one of the craziest scenarios I've ever seen. An API endpoint left wide open lets you hack anyone's router.
    Thanks for letting me make this video Sam!
    Article: samcurry.net/hacking-millions...
    Sam Curry: / samwcyo
    🏫 COURSES 🏫 Learn to code in C at lowlevel.academy
    👕 MERCH 👕 Like the shirt? lowlevel.store
    📰 NEWSLETTER 📰 Sign up for our newsletter at mailchi.mp/lowlevel/the-low-down
    🛒 GREAT BOOKS FOR THE LOWEST LEVEL🛒
    Blue Fox: Arm Assembly Internals and Reverse Engineering: amzn.to/4394t87
    Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : amzn.to/3C1z4sk
    Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : amzn.to/3C1daFy
    The Ghidra Book: The Definitive Guide: amzn.to/3WC2Vkg
    🔥🔥🔥 SOCIALS 🔥🔥🔥
    Low Level Merch!: lowlevel.store/
    Follow me on Twitter: / lowleveltweets
    Follow me on Twitch: / lowlevellearning
    Join me on Discord!: / discord
  • Наука та технологія

КОМЕНТАРІ • 1,2 тис.

  • @LowLevelLearning
    @LowLevelLearning  6 днів тому +234

    write better code than Cox. learn to code at lowlevel.academy and get 20% off lifetime access with code THREADS20 PogChamp

    • @player_3
      @player_3 6 днів тому +3

      Only if I can learn how to do this to mine. 7:03

    • @jfbeam
      @jfbeam 6 днів тому +4

      Cox didn't write a single line of that *ROUTER* firmware. (it's not a g.. d... MODEM. hacking modems would be a serious issue.)

    • @MacGuffin1
      @MacGuffin1 6 днів тому +4

      hacker grease mmmmmmmm delicious ....

    • @daveogfans413
      @daveogfans413 6 днів тому +1

      Nice i3wm default window styling. It really confused me at first.

    • @pauljones5620
      @pauljones5620 6 днів тому +3

      I'm interested in this but I click on 'Pricing' and I'm asked to set up a account, I want to see the prices before I hand over any details.

  • @pele7208
    @pele7208 6 днів тому +2630

    "If you think professionals are expensive, try hiring amateurs."

    • @brettlaw4346
      @brettlaw4346 6 днів тому +42

      Most people don't take into account opportunity cost. Especially, amateurs.

    • @shapelessed
      @shapelessed 6 днів тому +185

      I got hired by a startup when I was an amateur.
      First week of browsing through their repos - 3 0-click RCE and remote shell exploits patched. I had to educate their "senior" on how much they f'd up.
      I don't think hiring amateurs is that expensive (in some cases), it's much like with doctors. Experienced doctors will naturally go for the most obvious explanations, while med students will still remember their training enough to consider the "rare cases". That's why you would generally want an opinion of an experienced doctor and a newbie to extrapolate what may actually be wrong.

    • @RYOkEkEN
      @RYOkEkEN 6 днів тому +29

      @@shapelessed great, one exception, duly noted

    • @charliemopps4926
      @charliemopps4926 5 днів тому +28

      eh... I think its even less than that. Honestly, amateurs are often MORE likely to try and stick to standards because they know fewer tricks on how to get arround them. The problem is when your leadership demands you finish the project NOW!!! because they think yelling is an effective motivator... so the development team slaps something together meeting the bare minimum of requirements (which of course, didn't include security provisions) and call it a day. Those on the team with the most experience, usually have experience in exactly this... how to get code out the door that meets those requirements quickly, and which standards they know the company isn't going to bother checking for.

    • @cherubin7th
      @cherubin7th 5 днів тому +9

      Why? This was messed up by a professional. Professionals are just people who do it for money with the least amount of work necessary and caring more about unions and pay raise than security.

  • @wolfieboy09
    @wolfieboy09 5 днів тому +600

    'How did you bypass auth'
    'Simple, do the request again'

    • @Nevir202
      @Nevir202 День тому +12

      If at first you don't succeed, try, try again! LOL

    • @Franck_Major_X
      @Franck_Major_X День тому +2

      This made me laugh tbh

    • @crypto.7562
      @crypto.7562 14 годин тому

      FR lmao

  • @brbl415
    @brbl415 6 днів тому +3010

    accidentally, it's a backdoor

    • @susstevedev
      @susstevedev 6 днів тому +51

      Was gonna comment the same thing

    • @stucevevo8947
      @stucevevo8947 6 днів тому +251

      You can accidentally find something purposefully placed. Like that time I accidentally noticed a glass pane with my head while running. It was purposefully placed there to be a sound dampener.

    • @wrathofainz
      @wrathofainz 6 днів тому

      ​@@stucevevo8947bonk

    • @kcin4206
      @kcin4206 6 днів тому +4

      ran here to say the same xD

    • @monad_tcp
      @monad_tcp 6 днів тому +27

      imagine not telling anyone you found this and giving everyone free internet !

  • @benheidemann3836
    @benheidemann3836 6 днів тому +297

    For me, the 0-100 moment was from “oh, the swagger docs are in production” to “oh, I can call an API without being authenticated”

  • @AntVenom
    @AntVenom 6 днів тому +986

    Just a heads up, towards the end of the video (27:19) you said you "think Cox fixed the issue within a month or two." Using the day/month/year calendar, that makes sense based on what this post has written, but I think this post had the date in a month/day/year format, suggesting the bug was hot fixed within a day of it being reported, not a month.
    I can only imagine how many heart attacks this researcher nearly had from beginning to end of this story.

    • @TheJunky228
      @TheJunky228 6 днів тому +127

      I have to deal with the date differences all the time at work, because we have people in the US, Germany, Romania, Greece, etc. I'm at the point that I write dates in a format like today is 11Jun2024 instead of 5-11-24 or 11-5-24 or 24-5-11

    • @Exzcgal
      @Exzcgal 6 днів тому +111

      Antvenom, what are YOU doing here?

    • @Kenionatus
      @Kenionatus 6 днів тому +28

      ​@@TheJunky228That definitely is the safest way.

    • @justin423
      @justin423 6 днів тому +23

      My Perl script completely agrees with Jun being the 5 month of the calendar…)

    • @gruanger
      @gruanger 6 днів тому +26

      @@TheJunky228 I am in finance in the U.S. but my corporate clients are global. I spell the month out also, otherwise it gets too confusing. I generally follow the day month year rule but even then there are times you have to question it so I also went to always spelling the month out.

  • @evocorporation6537
    @evocorporation6537 6 днів тому +1424

    Cox once put corporate domains from an email whitelist (to allow them to send emails en masse) onto a blacklist, ensuring hundreds of firms cannot send emails to Cox users, then pretended those corporations are at fault. Those corporations are blocked to this day

    • @BillAnt
      @BillAnt 6 днів тому +39

      Not trying to defend any corporation, but these are complex systems run by imperfect humans, so vulns are bound to happen, it's inevitable.

    • @evocorporation6537
      @evocorporation6537 6 днів тому +253

      @BillAnt the problem is that those corporations that were now blocked all asked Cox to revert it, and Cox just either ignored them or blamed them for it.
      Source: it included my former employer, who is actually a household name in my country in western Europe.

    • @GhostGlitch.
      @GhostGlitch. 6 днів тому +219

      @@BillAnt mistakes are expected. Refusing to admit fault or fix those mistakes? That's an entirely different thing.

    • @TehPwnerer
      @TehPwnerer 6 днів тому +11

      If you own the mail server sending the mail it would be trivial to prove who's at fault

    • @ottergauze
      @ottergauze 6 днів тому +35

      Living up to their namesake, no?

  • @chickenmanfy
    @chickenmanfy 6 днів тому +903

    I need a Low Level Learning saying "Cox" compilation

    • @monad_tcp
      @monad_tcp 6 днів тому +114

      cox was coxed

    • @LowLevelLearning
      @LowLevelLearning  6 днів тому +230

      Send it to me

    • @nodrance
      @nodrance 6 днів тому +11

      and tr-069

    • @BillAnt
      @BillAnt 6 днів тому +49

      @@LowLevelLearning : New t-shirt "I will stick my COX into their server"

    • @HRightsRUseless
      @HRightsRUseless 6 днів тому

      @@BillAnt Drake and his gang are all shoving cox into minors

  • @brawldude2656
    @brawldude2656 6 днів тому +219

    Bro went out and accidentally discovered another vulnerability after he got hacked via a different method 💀

  • @andreasguillot2057
    @andreasguillot2057 6 днів тому +773

    kudos to Cox for eventually opening a conversation with Sam.
    the poor office worker must have been very confused. "this doomsday apocalypse guy claims to have found a way to hack all of us"

    • @Tabu11211
      @Tabu11211 6 днів тому +11

      Lmfao

    • @smlgd
      @smlgd 6 днів тому +66

      Biggest problem with pretty much any ISP in the world is that every possible interaction interface you have to them is through these kind of workers and there's direct way to talk to someone that has any actual knowledge about their tech and those guys won't put you through because a) company policy doesn't allow it and b) they couldn't care any less anyway because they're underpaid and overworked

    • @johnsmith8981
      @johnsmith8981 6 днів тому +46

      As someone who has worked at an ISP I laughed so hard imagining what was going through that worker's head. 🤣
      If I had a dollar for every time a crazy customer told me they were hacked I'd have been retired by now.

    • @Hitman12.
      @Hitman12. 6 днів тому +14

      He has definitely earned the right to have that original modem back to tinker with. It's likely been collecting dust in some warehouse for years, I'm sure they could find it with a little effort.

    • @oxylepy2
      @oxylepy2 6 днів тому +6

      ​@@Hitman12. Whoa whoa whoa, you mean to tell me we can put a little effort in and do something good, or do nothing at all? Well hot damn, nothing at all it is, "Sorry, sir, we cannot give you back the original modem"

  • @JeffreyMichaud
    @JeffreyMichaud 6 днів тому +257

    I work for a Large ISP, we can push settings, pull settings, get train rates, see connected devices, i can bridge ports to WAN so I could expose anything plugged directly into our gateway directly to the public network, if you changed the passwords on the device I can force reset them, or even factory reset the whole device. If you care about your privacy and safety use your own router

    • @AkashMishra23
      @AkashMishra23 6 днів тому +19

      Some ISPs that offer gigabit fibre have the fiber termination point and WiFi router in the same package, I had no other option than to get the UniFi Dream Machine SE and disable the WiFi on the modem and plug a local network to the wan port on the udm se, then all traffic goes through the udm and the UniFi WiFi gateways, but this vulnerability and how they reacted to it has me concerned, the modem is huge and gives off a lot of heat and is quite capable, all that power, complexity and control is breeding ground for breaches and malware, I just hope I can set up pf sense to work well

    • @yamusa85
      @yamusa85 6 днів тому

      @@AkashMishra23 try searching forums about that device of your isp. It just may happen you could replace it with sfp supported your very own router.

    • @orppranator5230
      @orppranator5230 6 днів тому +5

      Yeah, it seems that nothing related to the internet cares about privacy at all.

    • @tyler108
      @tyler108 6 днів тому +4

      by own router, you mean a router not supplied by the ISP, or some DIY device lol? and if we use our own router, what capabilities does the ISP have?

    • @ilikechikkin
      @ilikechikkin 6 днів тому +23

      But you have to admit, from a tech support perspective the reason to have that much control is because the vast majority of customers calling in can't figure out how to set up a wifi password and just want the ISP to do it for them so they can get on with their day.

  • @luisfarias2360
    @luisfarias2360 6 днів тому +422

    bro could have easily just “lost” the router and paid for the missing equipment

    • @pauls5745
      @pauls5745 6 днів тому +43

      yeah, I'd've backed out on getting the new one right then, come back next day w/o the old router.

    • @LCRich2001
      @LCRich2001 6 днів тому +1

      @@pauls5745 holy it’s been some time since I last saw a double contraction. I’d’ve just wrote ‘I would have’.

    • @james6794
      @james6794 5 днів тому +34

      or did everything he wanted to do before getting a new one.

    • @jamescollier3
      @jamescollier3 5 днів тому +40

      yeah. a computer genius, but then gives away the router lol

    • @bobbobby1624
      @bobbobby1624 5 днів тому +1

      yeah if you thought there was some crafty zero day exploit in your router and you are a exploit researcher first thing you would do would be to pull a firmware dump off the device, probably even directly via the chip itself incase its some NSA level shit that has hijacked the normal device operation and if a firmware dump is initiated either feeds back unmodified data or quickly deletes itself to avoid the code being exposed, handing the device back to some minimum wage worker who will just tag it as damaged/faulty on the system and chuck it in a bin was a pretty silly move, you would either just pay the extra and say you lost it or dump everything you might find useful before giving it back,
      Cox said they checked and hadn't seen any evidence that anyone else had used this exploit, now that's not to say they hadn't but cleared up after themselves to hide it, its also possible that whatever hacking group had infected his router possibly just paid a Cox support engineer to access his account directly and push an infected firmware out to his device via official channels rather than via this exploit, that's the risk with any of these engineer protocols, it only takes 1 low level employee with the right level of access to completely compromise the entire system for a few hundred bucks per hit, seen similar stories with people working for hacking groups actually going out and getting jobs with places like Verizon so they can clone SIM cards etc to compromise giant accounts via 2fa exploits to push crypto scams etc

  • @Chickenbreadlp
    @Chickenbreadlp 6 днів тому +79

    This reminds me of another story I read about a German ISP years ago, must've been at least 5 years ago.
    The ISP in question (I believe it was Vodafone Germany, Unity Media or Kabel Deutschland; definetly one of these three) wasn't providing customers with the credentials necessary to use any router on their network (at the time they didn't had any legal obligation to do so, so they forced customers to use the rental routers).
    So one of their customers didn't want that rental unit and instead wanted to use their own router, so they started digging in the rental router from their ISP to get it to spit out the network credentials. While doing so they found out that bypassing the rental router and getting direct access to the ISPs network also gave them direct access to a similar maintanance API, completely without any authentication requirements (after all, you wouldn't normally have completely free access to this part of the network). So it was fairly trivial for them to change any router from that ISPs network, just by using his own router.
    Not only did the ISP fix that vulnerability quickly, it also sparked a big legal debate on whether or not it was legal for that ISP to demand usage of rental routers. The outcome was no and now everyone can use any router, even on the cable networks (which is now all Vodafone Germany)

    • @xerr0n
      @xerr0n 2 дні тому +2

      anything network related is zero trust, but i guess that's just my network side talking

    • @PhysicsGamer
      @PhysicsGamer День тому +1

      It's staggering to me that was ever considered acceptable. Were the modems and routers are least separate?

    • @Chickenbreadlp
      @Chickenbreadlp День тому

      @@PhysicsGamer Nope, they were one box. Outside of Fiber networks, it's pretty common here for the modem to be part of the router

    • @PhysicsGamer
      @PhysicsGamer День тому

      @@Chickenbreadlp Can you not just buy a separate modem? So long as it's compatible (DOCSYS version, etc.) you should just be able to put your own router behind it...

    • @Chickenbreadlp
      @Chickenbreadlp День тому

      @@PhysicsGamer to use a modem you still need the network credentials from the ISP, which they weren't giving out at the time. They weren't even offering the option to just get the modem. It was rental router or nothing. Iirc only fiber ISPs provide a dedicated modem, but even that's a controversial topic, because it's another device drawing its own power, when a modem+router combo is power efficient...

  • @thfsilvab
    @thfsilvab 6 днів тому +231

    When I bought my own router, my ISP insisted on configuring it to be remotely accessed, I allowed them to configure it just because I was already pissed and disabled it right after, no no no, no ramdom person access here

    • @jfbeam
      @jfbeam 6 днів тому

      The way many managed services work, they reach out to the control server periodically. While it may not be "remotely accessed", it can still be remotely managed. (and if it does check in, the backend systems mark it offline.)
      Considering 99.9999999999999999999999999999999999999999999999999% of customers are morons, this is the system we all have to live with.

    • @thegeekno72
      @thegeekno72 6 днів тому +17

      Good that you disabled access afterwards, I wonder what "just before" you was thinking, giving access to YOUR router to someone else

    • @TheNefariousFox
      @TheNefariousFox 4 дні тому +12

      Have them setup your network and tell them that you're modem will be plugged directly into a PC, and that you won't have a router. Then, once your internet is functional, setup your router, and tell your ISP to suck it!
      NEVER allow your ISP access beyond the modem.
      And NEVER rent hardware.

    • @matthewmiller6068
      @matthewmiller6068 4 дні тому +4

      One more reason I like separate equipment...because the way DOCSIS works you can't actually override the ISP's control of the device that is part of the modem.

  • @im1random263
    @im1random263 6 днів тому +311

    Thats why I'd never ever use any hardware provided by an ISP and obviously have all remote managing protocols disabled on the router I bought myself. Just the idea of anyone having access to my hardward would drive me crazy.

    • @iotkualt
      @iotkualt 6 днів тому +35

      Among the many reasons I use strong authentication, encryption, and firewall rules even within my own LAN, I don't trust my ISP provided modem. Every network is potentially hostile.

    • @par5ek
      @par5ek 6 днів тому +4

      wow, how did you buy the required modem? your isp allows the use of an unknown device connecting?

    • @iotkualt
      @iotkualt 6 днів тому +21

      @@par5ek Generally (in the USA anyways) you can buy compatible cable modems assuming they're on the ISP support list, but I'm uncertain on how much access they still retain as an ISP. By definition there has to be some sort of ISP side configuration or else you couldn't connect to their network.

    • @CentreMetre
      @CentreMetre 6 днів тому +2

      Luckily my ISP provided router (Eero, yes the amazon one) was so Atrocious i just bought a new one back in 2021, then i started to learn about this stuff and am glad i did. Unfortunately still have ISP provided modem but im pretty sure its just a fibre to ethernet converter so i dont mind too much.

    • @par5ek
      @par5ek 6 днів тому +12

      @@iotkualt I live in rural Patagonia, using internet over radio. I'm screwed 🤷‍♂

  • @Jessie-bl3rm
    @Jessie-bl3rm 6 днів тому +109

    "they fixed the issue in a matter of a month or two, which is really really solid"
    Was listening to the vid on the side when I heard this and stopped what I was doing to do a double-take.
    This vid wasn't scripted so I might be a bit pedantic here but I did want to make one comment. It seem that it was fully *resolved* in a month or two, but the vulnerability itself was shut down less than 24h after it was reported.
    That's honestly really cool they had that fast of a turnaround given how large Cox is. I've worked at enterprise companies in the past that brush security issues under the rug, so this is refreshing to see.

    • @XxZeldaxXXxLinkxX
      @XxZeldaxXXxLinkxX 6 днів тому +6

      I mean, that's why there's triage and priority management.
      There are many kind of bugs and vulnerabilities that show up that might need to sit on the back burner while compensatory controls are put in places.
      This is definitely not one of those issues lmao

    • @justin423
      @justin423 6 днів тому +3

      Siri, what is a P0 priority?……/s

    • @jfbeam
      @jfbeam 6 днів тому +5

      I wouldn't say it's "fixed". But they definitely put a band-aid over the hole in the fence. (changed the settings on the front-end server to Just Say No(tm). Whatever backend didn't have the correct settings very likely hasn't been touched.) It's common for places to address the symptom without giving any thought to the actual disease.

    • @youhackforme
      @youhackforme 6 днів тому +1

      This is the kind of issue that makes everyone and their mother shit a whole ass brick. You bet they fixed it in 24 hours. Either that, or the FBI comes in and does it for them lol

    • @werefrogofassyria6609
      @werefrogofassyria6609 3 дні тому

      @@youhackforme The FBI would only do something when that guy sends them the list of all their agents that he got from Cox.

  • @rhigrets8849
    @rhigrets8849 6 днів тому +220

    Wow, makes you wonder how many smaller ISPs have similar vulnerabilities.

    • @freedustin
      @freedustin 6 днів тому +57

      Small ISPs are in a better position to fix things. First off, their "higher ups" are likely a bunch of retired IT guys who already know how to handle this kind of thing. Secondly, the corporate environment isn't overbearing on them because its not a very big corporation. They can put orders through with little delay, emergency work can be started immediately. There is no pass the buck culture of excuses for failure in a smaller ISP.
      I love my local ISP, the big guys have outages all the same and schedule a fix that can take hours maybe days to get techs dispatched. But the locals are here within minutes...once they lose access to their hardware they already know and just fire the trucks up immediately and get to work. Even if its 3AM.

    • @iRunKids
      @iRunKids 6 днів тому +43

      I have a very small ISP (epb) and they’re light years ahead of my old isp (Comcast) in software, hardware, and security. It’s the large bloated megacorps that are very slow and sloppy with everything.

    • @anthonyheman4621
      @anthonyheman4621 6 днів тому +12

      Certainly some. But I'd trust some small ISPs over the megacorps. I've worked for a small ISP and then for a company that made software for ISPs and a lot of them don't want tools like remote execution on the customer's modem specifically because of the risk that can open you up to. A lot of shadier ISP stuff like tracking everything you've ever done or injecting notices into your browser that you're almost at your bandwidth cap isn't a high priority at some 100 employee ISP. Overall I think they usually were pro net-neutrality as well. Though I'm certain there's also plenty of them that don't prioritize security sufficiently.

    • @jfbeam
      @jfbeam 6 днів тому +2

      Everyone has these sorts of problems at one point or other. In this case, one of the backend servers doesn't have the same config as the rest, allowing unauthenticated requests. As for the nonsense that started this whole crap, pretty much every router ever made has some type of flaw. Since he gave it back, we'll never know what was going on with it.

    • @Jutastre
      @Jutastre 6 днів тому

      Don't see why size of the ISP would matter. Are you assuming they use cheaper/less secure stuff because they are small?

  • @MrZadeak
    @MrZadeak 6 днів тому +276

    As a fellow software developer who uses spring for backend development i can assure you that i forgot more than once to dissable swagger for prod env)

    • @pianissimo7121
      @pianissimo7121 6 днів тому +10

      I did the same too, luckily we have some verification that stops the code from running if endpoints are exposed.

    • @soanvig
      @soanvig 6 днів тому +14

      What's the difference? If the vulnerability is there available or not available swagger doesn't change anything. Obfuscation is not security.

    • @Zer0ji
      @Zer0ji 6 днів тому +19

      @@soanvig I think it would reduce the number of potential attackers. Having API docs that can be found by web scraping makes you an obvious target to someone just poking around for misconfigured websites.

    • @AbstractType1
      @AbstractType1 6 днів тому

      @@Zer0ji most potential attackers scan networks for points of access. Although I'm sure some of them would read through a swagger doc.

    • @soanvig
      @soanvig 6 днів тому +9

      ​@@Zer0ji Be on your toes the whole time when it comes to authorization. That's all. Having open Swagger just reminds you about it.
      Don't give yourself any sense of "lowering chance of potential attack" by obfuscation.

  • @Monotof1
    @Monotof1 6 днів тому +30

    The scary thing is that all the described stuff is really easy and very basic stuff. Its not something highly sophisticated or really obscure, the exploit just uses the most basic building blocks anyone who ever did anything in networking is familiar with.

    • @felixmerz6229
      @felixmerz6229 6 днів тому +10

      That's really the crazy part. I'm not exactly the hacker type, I don't have low-level hardware knowledge, but I can fool around with APIs, craft http requests, log responses, etc. This is all so basic I can't even believe it, no special knowledge required.

    • @theairaccumulator7144
      @theairaccumulator7144 3 дні тому +1

      I could've found this vulnerability when I was 12 lmao

    • @louisshyers3577
      @louisshyers3577 3 дні тому

      @@felixmerz6229 I do bug bounty and this happens alllll the time you'd be surprised. Almost all the bugs i've found have been a similar story, random api endpoint that has no business being exposed to the public

  • @makebreakrepeat
    @makebreakrepeat 6 днів тому +124

    TR-069? Nice backdoor for Cox

    • @sas408
      @sas408 6 днів тому +2

      Thats used by most ISPs. And almost every router supports that and turns on automatically

    • @TuxraGamer
      @TuxraGamer 6 днів тому

      ​@@sas408it's just a sex-related joke dog

    • @zenverak
      @zenverak 6 днів тому

      🤣

    • @snooks5607
      @snooks5607 5 днів тому

      @@sas408 none of my routers have for the past 20+ years. seems kinda crazy that people who are into computer security would let ISP's boxes into their home network

    • @kennytheamazing
      @kennytheamazing 5 днів тому +7

      @@sas408 you missed the joke

  • @JamesRouzier
    @JamesRouzier 6 днів тому +218

    You need to have a Cox counter

  • @MrRecorder1
    @MrRecorder1 5 днів тому +53

    That article reads a bit... like someone focused on the wrong thing:
    "I wonder how they hacked my modem"...
    [ 5 minutes later ] ...
    "Darn, this is the inside of a national bank vault, I do not want to be here" ...
    [ 5 minutes later ] ...
    "hacked the addresses of 5 FBI offices... also not quite what I was after" ...
    "nuclear launch codes" ...
    mmmh...
    "Ah here... this is it! Mr Router-company, please fix your software. I do not want my router to be hacked again, this is just such a nuisance!".

    • @lxdixd
      @lxdixd 3 дні тому +10

      i feel like once you get far enough as a pentester morbid curiosity overtakes logical thought

    • @chernobyl169
      @chernobyl169 2 дні тому +4

      Cybersecurity pros are a different breed.

    • @devnol
      @devnol 2 години тому

      Yeah I'd have trolled the fbi by changing their premises SSIDs first.

  • @TKing2724
    @TKing2724 6 днів тому +75

    How much was his bounty? Cox should be kissing his feet.

    • @YTDeletes90PercentOfMyComments
      @YTDeletes90PercentOfMyComments 6 днів тому

      Cox is probably getting screamed at by the feds for losing a backdoor

    • @xMdb
      @xMdb 6 днів тому +20

      Probs $0 lololol

    • @poisonouspotato1
      @poisonouspotato1 5 днів тому +9

      ​@@xMdbthis is why we can't have nice things. They should give him free internet for life

    • @LorxusIsAFox
      @LorxusIsAFox 5 днів тому +17

      My guess is that they left him with his Cox in his hands for all his trouble and all they benefited.

    • @mephestys2995
      @mephestys2995 5 днів тому +38

      Knowing how ISPs operate they're probably in the process of filing lawsuits against him.

  • @privacyvalued4134
    @privacyvalued4134 5 днів тому +19

    This is why you should always have a router under your direct control in between your ISP's router and your internal network. And turn off your ISP router's WiFi radio. Your ISP then sees exactly one device on your network - a router that doubles as a firewall. Defense in depth starts with precise control over your home network.

    • @pcguy619
      @pcguy619 День тому

      But then you’re dealing with double NAT if it doesn’t have IP pass through and/or DDDNS if you don’t have a dedicated IPv4.

  • @MimiWhiskers
    @MimiWhiskers 6 днів тому +55

    I hate it when ISP manages the network Gateway. The equipment they give always feels slow, cheap and unsecured to me. Plus the UI for a lot of the settings "if your lucky enough to have access to them" sucks, like 90% of the time.

    • @ChrisWijtmans
      @ChrisWijtmans 6 днів тому +2

      usually no VLAN or other features either.

    • @naptastic
      @naptastic 5 днів тому +5

      Yeah, if there's not a bridge mode, I say "heck it" and run double-NAT. It adds about .2ms to everything but in return, I get control over my network again.

    • @xor128
      @xor128 2 дні тому

      i just use my own modem and dumping the credentials from the isp modem

    • @Charaqat
      @Charaqat День тому

      @@xor128 The ISP can detect that when it doesn't react to some of their manual test requests, and then throttle your connection to force you to reinstall their proprietary equipment.

  • @AnomalousFerret
    @AnomalousFerret 6 днів тому +24

    I hate Cox, having them as my ISP. I dont use their hardware because they charge rental fees for it. They also removed all my port forwards after I told them it stopped working and then told me "Your plan doesn't allow for port forwarding."

    • @98f5
      @98f5 День тому

      They sell u a natted connection??

    • @PhysicsGamer
      @PhysicsGamer День тому

      How were they able to "remove ... [your] port forwards" if you're using your own hardware?

    • @devnol
      @devnol 2 години тому

      @@PhysicsGamer Remote management. They can change the settings you can (and even more) from their helpdesk. Most ISPs can through TR-069 and PPPoE

  • @gFamWeb
    @gFamWeb 6 днів тому +20

    I know it's very difficult to have a system where services like ISPs don't become monopolies, But I really think that one of the root causes of this is them being monopolies. They don't really have the incentive to make things secure, because customers can't leave anyway.

    • @Jason9637
      @Jason9637 6 днів тому +3

      This is the main reason I love starlink, it's giving a decent competitor to almost every ISP on the planet

    • @PhysicsGamer
      @PhysicsGamer День тому

      This is why Title II has the "right of non-discriminatory access ... [at] the same rates as competitors" clause. So that ISPs don't each need to run their own lines to set up their own networks.

  • @10Mike10
    @10Mike10 6 днів тому +40

    He states at the end of the article that it couldn't be this service because this service went live in 2023 and he was originally hacked 3 years prior. (In response to him still not knowing the original http stuff)

    • @gorak9000
      @gorak9000 6 днів тому +3

      Is it really new from the ground up, or did they just add to the API and have the graphics monkeys put some new look and feel to it?

    • @xmlthegreat
      @xmlthegreat 6 днів тому +1

      @@gorak9000 yeah you could be right. My ISP has had a function where they can reset my router for at least 4.5 years, now I'm gonna have to investigate how to firewall off the fiber router without them throwing a shit fit.

    • @10Mike10
      @10Mike10 6 днів тому +3

      @@gorak9000 it's really an "it depends" type of question. Generally speaking APIs don't have graphical interface so I would assume it's newer or they left developer permissions enabled on prod. (Seen this alot personally). Unless the actual protocol had an issue this is just bad API setup/migration

  • @monad_tcp
    @monad_tcp 6 днів тому +100

    5:48 that's why you always put another firewall in the front of your ISP crap device and never let it have direct access to the private network, so if it gets malware, their problem, as long as it doesn't make the internet slow

    • @JimAllen-Persona
      @JimAllen-Persona 6 днів тому +10

      Agreed. I pay about $500/yr in maintenance for my firewall in my house. Money well spent except yearly when the bill comes in.

    • @leexgx
      @leexgx 6 днів тому +1

      but this was on the router itself (modem mode with your own router installed wouldn't stop it)

    • @vegiemane
      @vegiemane 6 днів тому

      @@JimAllen-Persona uhhhhhhhh how? 500 a month is wild. Why not just use PfSense which is more secure, open source, and free?

    • @collectorguy3919
      @collectorguy3919 6 днів тому +9

      @@leexgx A router that you control certainly won't allow TR-069 remote API access from the ISP.

    • @collectorguy3919
      @collectorguy3919 6 днів тому +7

      It could log the websites you visit, unless you're using a VPN or encrypted DNS.
      Your temp IP could end up on a blacklist.
      The internet activity from the remote adversary would at first be attributed to you. "We found a server at this IP address, traced to this residential address...". That's exactly how they have found people running CSAM servers (CSAM=Child Sexual Abuse Material)

  • @cherubin7th
    @cherubin7th 5 днів тому +14

    So when a Cox worker needs free wifi, they can just disable the passwords of their customers and leech on it.

  • @DudeSoWin
    @DudeSoWin 6 днів тому +16

    When R&D makes everything "just work" and suddenly your house has no doors or windows. Breaking is the remaining 1/10th the law.

  • @chanm01
    @chanm01 6 днів тому +18

    I don't know anything about security. I just like these videos cause they're like interesting story time. So it's crazy to me how much of this was just "I wonder if I can do this thing? ...oh, it worked. So then can I do this other thing too?" And so on.

    • @XxZeldaxXXxLinkxX
      @XxZeldaxXXxLinkxX 6 днів тому +8

      I'm only a rookie, but yeah that's generally what the process is like. It's like any puzzle, you try different stuff until something works out.
      Of course, you build intuition along the way

    • @cjbprime
      @cjbprime 6 днів тому +5

      (for every "I tried X and it worked" in the blog post they're probably omitting five "I tried X and it didn't work"s)

  • @klti0815
    @klti0815 6 днів тому +33

    TR-069 is a loaded gun pre-pointed at every customers foot. All it needs is an ISP fucking up a little. But there is no way publicly traded ISPs will be cheap about software and security, right?

  • @BudgiePanic
    @BudgiePanic 6 днів тому +54

    The back door was left unlocked, opened, with a sign that read "come on in!"

  • @susstevedev
    @susstevedev 6 днів тому +446

    "Don't worry, hacker can't harm you"
    The hacker in question:
    Edit: everyone in the replies is a nerd

    • @prashank
      @prashank 6 днів тому +2

      Pretty sure people say the reverse

    • @susstevedev
      @susstevedev 6 днів тому

      @@prashank rly? or are you matrix

    • @user-sh9eh3wb8p
      @user-sh9eh3wb8p 6 днів тому +11

      @@susstevedev what in the yap are you talking about

    • @duckmeat4674
      @duckmeat4674 6 днів тому +1

      @@susstevedev what? Who says the hacker can't harm you? The entire point is for hackers to harm in some way

    • @-book
      @-book 6 днів тому

      @@user-sh9eh3wb8p seems like language barrier

  • @deibele1
    @deibele1 6 днів тому +36

    Spring Boot defaults beans to application scope. Most Spring Boot apps use a servlet thread model. I've seen a lot of people miss the implications of those two statements who should know better. They're clearing using custom security based on the encryptedValue parameter. I'd guess "authenticated" is a class variable and you can trigger a race condition and effectively steal the authentication of a prior request if your request comes in close enough. I've actually seen a very similar bug.

    • @bdotstanley
      @bdotstanley 6 днів тому

      Yeah, this is a very good point. A huge subtlety that is easy to miss is all Spring beans are singletons by default; it's so easy to just throw annotations on classes without actually knowing what is going on in the background. If you're using fields as state variables inside singleton objects, you're going to see issues. Things like Tomcat use a thread pool to process incoming requests - all of which will share the exact same reference of your Spring beans.

    • @yanray8805
      @yanray8805 6 днів тому

      I think this is a pretty good guess, I've read simliar article

    • @skillfulfighter23
      @skillfulfighter23 5 днів тому

      This is a common problem with SSR as sometimes devs store authorization states in global variables

  • @romancandlefight1144
    @romancandlefight1144 6 днів тому +7

    Another classic corporate case of
    "We investigated ourselves and found no issues" (screeching sounds of overloaded shredders in the background)

  • @ToniMorton
    @ToniMorton 6 днів тому +29

    casually embeds malware into your router via the api by renaming the modem a really weird name lmao

    • @ToniMorton
      @ToniMorton 6 днів тому +1

      i wonder if it replays the http request to like fetch the page for a preview for the C2

  • @ChaseMMD
    @ChaseMMD 6 днів тому +5

    Seeing these tools again is bringing me back. I was actually working as a tier 1 support agent for the business sector at Cox. Like the author explains we had a lot of power to remotely control the devices. However, residential often was running the short end of the stick so usually they had to follow a predefined tree script. So business customers you can say have preferential treatment and usually higher skilled agents. Outside of what I know at this time. But interesting to see this in my feed.

  • @8KY8
    @8KY8 5 днів тому +2

    I'm a programming beginner currently studying API development and testing and this just made my heart rate explode the more this story developed. Thank you for sharing!

  • @user-ev9jg6ts6e
    @user-ev9jg6ts6e 6 днів тому +25

    IMHO, the author uses "signing" because of HMAC signature which is computed by using a secret key

    • @Daniel15au
      @Daniel15au 3 дні тому

      The key isn't very secret if it's in the JavaScript code lol

  • @tommybronze3451
    @tommybronze3451 6 днів тому +4

    I did a gig with a ISP for about a year. I've raised enough alarms about all the security holes in tr69 implementation that they had, and ultimately it got me a sac. Sad part is that this ISP still distributes their binaries with hardcoded admin passwords for TR69 implementation that can be reached from anywhere in the world ... yeah.
    Needless to say I run my own router and everything past the wall is isolated from ISP.

  • @gageracer
    @gageracer 6 днів тому +7

    Exposing swagger on prod is a new level. It shows that any of us can do any job, the people with 5+ years of xp are doing all this.

    • @anthonyheman4621
      @anthonyheman4621 6 днів тому +6

      I've found tons of exposed API docs, and if that's not available and I have a valid login I can still observe my traffic and make out as much of the schema as I have access to. At the end of the day that's fine, as long as authentication and authorization is working correctly.

    • @danielschmider5069
      @danielschmider5069 6 днів тому +1

      So you think the swagger docs on the test system is different from the one in production?

  • @Haukman
    @Haukman 5 днів тому +2

    If I remember correctly from the video, one of the API calls was to get browser traffic from the modem (maybe the modem collects this for customer service troubleshooting). Is it possible that someone was making an api call to retrieve that for his original MAC address, and then making the same requests? The delay between the requests weren’t constant. Instead of actual malware installed on the modem, it could’ve been someone else exploiting the API.

  • @wcisnijstart
    @wcisnijstart 4 дні тому +3

    "He's getting his Cox hacked"
    Honey, they neuralinked our poultry

  • @BurkeJones
    @BurkeJones 6 днів тому +3

    They could use the API to set up port forwarding and start snooping on your network. Security cameras that don't have good security or known vulnerabilities, unpatched workstations, cheap streaming devices with known back doors. The scary part is not them reading your network traffic, but the access they have to all your connected devices.

  • @maliciousfry
    @maliciousfry 6 днів тому +2

    Your content is really great for advanced technical users that aren't exactly security experts. The explanations you offer are easy to follow and make a lot of sense. Thank you for breaking down and going through these articles with us!

  • @wrathofainz
    @wrathofainz 6 днів тому +19

    Now we have footage for a "cox compilation"

  • @hherpdderp
    @hherpdderp 6 днів тому +9

    TBF to the guys in the ISP's shop.
    They've probably heard someone absolute headcases say stuff about their modems being hacked before.
    Years ago i worked in a supermarket, and a customer lost their shit about some product display watching people.
    It had an infrared sensor that triggered a noise when people walked by....

    • @jamiealeksic8428
      @jamiealeksic8428 5 днів тому +1

      The crazy part is that some vending machines theses days do actually monitor people with cameras and in the fine print on the digital displays for them almost all of the ones with cameras reserve right to send that data back to home base for whatever purposes they want

    • @Snail641
      @Snail641 День тому

      Dont expect much from minimum wage workers. They're minimum wage for a reason.

  • @Zuriki09
    @Zuriki09 6 днів тому +3

    I worked tech support for a budget ISP a while back. We could see your wifi password. If you had email with us, we could even read your emails. No I didn't need anything to verify you gave us permission to access the account - just clicked a "yes I've identified the customer" button.
    Never use an ISP that doesn't let you BYOD. Always use your own device, turn off remote access protocols you don't own, don't use the ISPs own email service.

  • @blzby6592
    @blzby6592 6 днів тому +37

    The picture of the COX store actually scared me for a second. The researcher must live where I live!

    • @eso210
      @eso210 6 днів тому

      Orange County? Lol

    • @blzby6592
      @blzby6592 6 днів тому +1

      @@eso210 Nah this is in the Omaha area

    • @agmhelena7266
      @agmhelena7266 6 днів тому

      ​@@blzby6592 that narrows it down for hacermans lol

  • @nathanielthomas4437
    @nathanielthomas4437 6 днів тому +1

    I absolutely love this article, thanks for breaking it down to something the rest of us can understand! Hilarious that Cox just had a server that had no authentication whatsoever. More videos like this please!

  • @framegrace1
    @framegrace1 6 днів тому +11

    That's why been years not using any ISP modem.
    I've seen this exact thing happening (let 1 of the backend servers with auth unconfigured) before. 2 times to be exact.
    The first is what happens when you have draconian security rules for a service, and operators alone on weekends with boureoucracy problems to get the access.
    One day, some guy, uses one incident to open one of the 10 servers and take note of the IP, so he can ensure the support.
    The other time was due to some testing. A node was removed from the pool, and disabled auth to test some changes. It was put back to the pool without re-enable.

    • @gorak9000
      @gorak9000 6 днів тому +4

      On DOCSIS, even if you use your own modem, the ISP updates the firmware on it, so you're still potentially vulnerable regardless of if you bought the modem, or if you rent it from the ISP - they're all running the same code anyway.

    • @framegrace1
      @framegrace1 6 днів тому

      @@gorak9000 DOCSIS? that's CableTV?
      WTF, that still exists?

    • @prevailz1
      @prevailz1 2 дні тому

      ​@@gorak9000yep, even a neighbor could force a modified firmware to your modem and you'd never know.

  • @JohnWilliams-gy5yc
    @JohnWilliams-gy5yc 6 днів тому +3

    "If I say Cox again, I would get demonetized."
    Hacker: Of course, that's the intention, never random.

  • @spitfire7772
    @spitfire7772 4 дні тому +3

    I think the API architect will have to find another job... 💀

  • @Filaxsan
    @Filaxsan 6 днів тому

    Wow! That was a crazy story - and great video! Thanks for sharing brother, take care!

  • @nvbaxormgh
    @nvbaxormgh 6 днів тому +6

    I found an issue a week ago with my ISP that let me get any customer’s information with just an account number. Then I found out how to get an account number from either an address or phone number.
    Thankfully it looks like it’s fixed already from what I could tell.

  • @rodrigoqteixeira
    @rodrigoqteixeira 6 днів тому +4

    6:41 "I think if I say cox again I will get demonitised... Cox!" 😂

  • @cmoor8616
    @cmoor8616 6 днів тому +25

    TLDR: Man got his box infected. Showed his Cox to unimpressed store staff. Friends confirmed the source of infection was someone who put it about but remained anonymous.

    • @qoombert
      @qoombert 6 днів тому +7

      he showed his what

    • @beachaholic4
      @beachaholic4 5 днів тому

      @@qoombert Showed his big eight-inch cox

  • @privacyvalued4134
    @privacyvalued4134 2 дні тому +1

    One other thought I had: This guy found _a_ vulnerability. But he probably didn't find _the_ vulnerability. The first router they returned to Cox was compromised but probably just put into circulation again and given to some unsuspecting Cox customer instead of being taken apart and carefully analyzed and then thrown in the bin.

  • @stylis666
    @stylis666 День тому

    In the middle of this I read your shirt. I love that shirt! I want one! That's exactly why I started to learn programming, as a start off point to learn machine language, and the machines. I want to know what EVERYTHING does.
    And I probably never will, but I'll have a blast along the way, learning and applying more and more.

  • @evertchin
    @evertchin 5 днів тому +3

    Ive immediately thought of the tr-069 after watching for a minute or so.😅

  • @sinancetinkaya
    @sinancetinkaya 6 днів тому +26

    Remotely accessible modem by ISP is a dumb idea

    • @kerr1221
      @kerr1221 6 днів тому +13

      and... it's one that they all do.
      My ISP remotely removed all ny port forwards last week. it was lovely.

    • @thewhitefalcon8539
      @thewhitefalcon8539 6 днів тому +17

      Their average customer doesn't know how internet works and calls for tech support. It's not that crazy.

    • @martinzihlmann822
      @martinzihlmann822 6 днів тому +21

      there should be a physical button that you need to press to give the support staff access.

    • @adreto2978
      @adreto2978 6 днів тому

      @@kerr1221 Can you ask your ISP to do this? I'm so paranoid now lol

    • @XxZeldaxXXxLinkxX
      @XxZeldaxXXxLinkxX 6 днів тому +9

      ​@@martinzihlmann822bro users can't even find the power button on their monitor and PCs sometimes and you want them to find an obscure button on a device they've probably never touched otherwise?

  • @logiciananimal
    @logiciananimal 5 днів тому

    What an amazing story. Thanks for sharing - to both of you.

  • @matthewstott3493
    @matthewstott3493 4 дні тому +1

    More terrifying is that the hacked modem was very likely re-issued to another Cox customer.

  • @slluxxx
    @slluxxx 6 днів тому +4

    jesus christ
    I dont trust any isp that didnt go through 20 staging servers and unit testing on **everything** before deploying. Especially anything API needs brutal and constant testing

  • @jovsta
    @jovsta 6 днів тому +5

    The original compromised device triggering the reply is to potentially steal the user's session on some services?

    • @gooniesfan7911
      @gooniesfan7911 6 днів тому +2

      Crypto currency 🤫

    • @Darkyx94
      @Darkyx94 6 днів тому +2

      Might be, especially since they were already running some phishing scheme.

  • @involuntaryascetic3602
    @involuntaryascetic3602 8 годин тому

    the overwhelming power of just asking again but saying "pretty please" at the end

  • @unkreativnet
    @unkreativnet 6 днів тому +1

    Very nice explaining. The storyline was amazing :-)

  • @OS.CUCCOS
    @OS.CUCCOS 6 днів тому +37

    Well that's how you royally f*Ck up and lose customer trust. Btw wouldn't they have thought of the consequences of using such a loose security system when they built it in the first place?.

    • @matthewspencer2094
      @matthewspencer2094 6 днів тому +17

      Definitely, anyone working on anything like that understands the necessity of security.
      A functional prototype would have been built and demonstrated; then management would have forced the Devs to move on to other projects before doing the invisible but essential tasks. Tale as old as time.

    • @forivall
      @forivall 6 днів тому +11

      Hahaha its American ISPs though, they're likely the only ISP in the region

    • @CentreMetre
      @CentreMetre 6 днів тому +2

      This looks like US or maybe canada from photos so: dont have to care when theres no competition.

    • @forivall
      @forivall 6 днів тому +1

      @@CentreMetre yeah, Cox is American. At least these days, Canada requires that the large ISPs must sell wholesale access to small carriers, so there can be some competition here. (Since 2016)

    • @CentreMetre
      @CentreMetre 6 днів тому

      @@forivall Ah ok, thats good. Tbh i dont really know much, just what ive heard from the WAN Show, thanks for telling me

  • @user-oj9iz4vb4q
    @user-oj9iz4vb4q 6 днів тому +51

    "API dev forgot to turn or swagger"
    or you know, the api is designed for external consumption. You'd imagine business with alot of accounts would want something like that.
    Disabling swagger is security through obscurity, which isn't security.
    the fact that their API wasn't validating tokens on the other hand.......

    • @aimardcr
      @aimardcr 6 днів тому +7

      Yeah it was the matter of how they actually handle the APIs authentication. The exposed swagger documentation was just another step to make it easier.

    • @syrusxd
      @syrusxd 6 днів тому +2

      If it was obscure, the API URIs might've not been located and abused, which is a big plus for security, but if authentication/authorization security worked how it should've then it shouldn't matter. Both are important points though

    • @iooooooo1
      @iooooooo1 6 днів тому +1

      Maybe, but doubtful. It's not covered in much detail in the video, but a naive load of the swagger API page just resulted in a redirect loop and shouldn't have been actually usable for external users. He had to do some work to find a way to get it to load any actual resources. In the blog post this is the heading "Loading Static Resources from Reverse Proxy API".

    • @mideno7619
      @mideno7619 6 днів тому

      I mean, maybe? I get the point but if you could have the complete information about every system then you can even predict the random numbers that are generated to provide cryptography features. I know that in this case there was a bigger vulnerability hidding but also I can see how the amount of information you provide to attackers closely match the level of security you have.

    • @binaryblade2
      @binaryblade2 6 днів тому

      ​@mideno7619 not if they're using hardware entropy generators for key generation which they should be.
      Hiding api documentation that can be inferred by reading the Javascript is not security in any sense. Thinking it is security cause people to ignore or be overly confident about real systemic issues.

  • @Tzitzemine
    @Tzitzemine 5 днів тому +1

    The hack was a poetic setup. Server from "Digital Ocean" + every request played back ... just like waves crushing on the sand at the beach and then slowly falling back into the sea *sighs*. Yep, true poetry.

  • @techydude
    @techydude 6 днів тому +1

    this reminds me of a news story several years back, when someone discovered that basically the same http replay was happening on any/every? Telstra (Australia’s largest ISP) connection (discoverer had just run up a new server which no one knew about, but logs showed a repeat of his own http request a few seconds later from an IP in Canada IIRC). at the time it was reported to be Telstra doing some kind of customer traffic analysis outsourced to a foreign 3rd-party.

  • @harshavardhanbose
    @harshavardhanbose 6 днів тому +5

    What baffles me the most is how did that guy have that much of free time 😅

  • @forxstsombodi3043
    @forxstsombodi3043 6 днів тому +9

    Hate it when my Cox gets hacked.

  • @rustyshackleford5166
    @rustyshackleford5166 3 дні тому

    I love this type of turbo-nerd investigation hacker stuff. What a thrill ride for a dork like me.
    Idk what a lot of this stuff is but I know enough to keep up with what's going on.

  • @LP-fy8wr
    @LP-fy8wr 5 днів тому

    Great episode man well done!! This has to be one of my favs. Keep up the great work!! Oh and Thumbs up for that 2nd Cox!

  • @MyWatermelonz
    @MyWatermelonz 6 днів тому +5

    What's with the npc spam bot comments about views. It's so dumb

    • @OhhCrapGuy
      @OhhCrapGuy 6 днів тому

      A lot of those are actually this weird online pseudo-cult called UTTP. They're actually really concerning.

    • @commentidelloziopera
      @commentidelloziopera 5 днів тому

      @@OhhCrapGuy ?

    • @OhhCrapGuy
      @OhhCrapGuy 5 днів тому

      @@commentidelloziopera I don't recall if this was the video I watched, but: ua-cam.com/video/ABIXt5R4vV8/v-deo.html

  • @TheMrbrookster
    @TheMrbrookster 6 днів тому +10

    Interesting response from Cox, I thought the standard response to this sort of discovery was to sue them for unauthorised access.

    • @kintustis
      @kintustis 6 днів тому

      Their lawyers are drafting the papers now. Just wait.

    • @XxZeldaxXXxLinkxX
      @XxZeldaxXXxLinkxX 6 днів тому

      Why would you think that, given that they have an established responsible disclosure program?
      I hate ISPs as much as the next guy but that's just silly

  • @amy31337
    @amy31337 4 дні тому +2

    I’ve reverse engineered isp routers before and they have terrible security around tr69 in particular. Disclosed the issue to them and they said “it is not an issue they were concerned with” even though you could remotely compromise the router…

  • @MacS7n
    @MacS7n 5 днів тому +2

    Intentionally, it’s a documented backdoor that only a few were supposed to know but they had to make it open to later claim that it’s a mistake and not intentional.

  • @noisetide
    @noisetide 6 днів тому +3

    Guy seriously insisting on calling it c o * k s
    Instead of just spelling abbreviation letters C O X (see oh ex)
    Just what they were thinking when naming the thing COX ??? 💀

    • @user-gi7vi9gm4t
      @user-gi7vi9gm4t 6 днів тому +1

      Coaxial cable is a type of cable that can be used to transmit ethernet via Ethernet over coax

    • @noisetide
      @noisetide 5 днів тому

      @@user-gi7vi9gm4t Still could've been made COaX or something...

    • @AlexanderBukh
      @AlexanderBukh 4 дні тому

      Were thinking of cox

  • @cslearn3044
    @cslearn3044 6 днів тому +3

    Hah, he said the c word, funny

  • @repairstudio4940
    @repairstudio4940 6 днів тому

    Bro this was amazing investigative work. This is insane. Very well done. 😎

  • @AndyHerbert254
    @AndyHerbert254 2 дні тому +1

    Some tips for the internet, guarantees in fact:
    * DNS is unencrypted (except Dot/DoH). If you let your ISP be your DNS provider, they can see what websites You're visiting.
    * HTTP is unencrypted (duh)
    * ISP owned modems are like asking for a man in the middle attack. Own as much as your own network infrastructure you can.
    * Traffic over predefined ports can easily be suspected to identifying it's purpose and potentially being modified, unless there's integrity measures for the protocol in use.
    * Even if you encrypt all traffic going out of your router and to the Internet, the source and destination IP address will always be visible in plain text effectively. This is required for IP to work. If you want to avoid even this from being spied on, use a local VPN or multiple gateway VPNs for even more anonymity. Effectively form a Tor network.

  • @veqox3245
    @veqox3245 6 днів тому +5

    cox

  • @mohammedalharbi3963
    @mohammedalharbi3963 6 днів тому +24

    420 views in 4 mins bro im high

    • @shadowxsm
      @shadowxsm 6 днів тому

      aye

    • @3isr3g3n
      @3isr3g3n 6 днів тому +1

      Not the only one mate, cheers

  • @ALLCAPS
    @ALLCAPS 4 дні тому

    lol when best practices backfire. Great video! thank you for showing this.

  • @EinSatzMitX
    @EinSatzMitX 6 днів тому +1

    This ist literally the Most interesting Story I've heard in a Long while.
    Definitely Made my day

  • @neilclay5835
    @neilclay5835 6 днів тому +12

    He should get a lawyer, he admits exploiting vulns on a consumer network.

    • @spookycode
      @spookycode 6 днів тому +11

      Well, cox does have a responsible disclosure program. I would assume that you are allowed to prod around as long as you don’t interfere with other customers devices without permission.
      But yea, you should have a lawyer on quickdial as a white hat especially when dealing with ISPs since they might decide to throw you under the bus to sweep their own mistake under the rug.

    • @issamabbas2041
      @issamabbas2041 6 днів тому

      shouldn't they pay him? I mean I understand your pov but like shouldn't they legally?

    • @XxZeldaxXXxLinkxX
      @XxZeldaxXXxLinkxX 6 днів тому

      ​@@spookycodeIt makes no sense for any business to do that though. It's in their own best interest. Betraying people going through RD is a one way ticket to never having vulnerabilities disclosed to you again, and have it all sold on the dark web. This would cost way more money in the long run

    • @helloofthebeach
      @helloofthebeach 3 дні тому

      If he works in pen testing, I assume he has that covered several times over.
      He certainly didn't "exploit" anything, since he only targeted equipment exclusively associated with his own account, changing things he could have easily changed locally (like the SS!D). It's the most harmless thing he could have done with the vulnerability. That wouldn't mean much to a berserk corporate legal department, but Cox seems wiser than that, at least.

    • @neilclay5835
      @neilclay5835 3 дні тому

      @@helloofthebeach Yeah I agree, but "beserk corporate legal departments" are well known to exist. Cheers.

  • @slawomirilkow661
    @slawomirilkow661 3 дні тому

    I've been waiting for this video for over 25 years :) Somehow I never had time to do it myself, I preferred to "patch" the problem

  • @G0dspeeeed
    @G0dspeeeed 6 днів тому +1

    This is absolutely wild

  • @KeesAlderliesten
    @KeesAlderliesten 5 днів тому +7

    low level earning... reading others blogbosts out loud....

  • @malevopfgm
    @malevopfgm 5 днів тому

    There are a lot of stories regarding ISP managed devices, back in the day we use to get higher bandwidth than contracted just by hardcoding the external mac address of a router to a specific prefix.

  • @ArtemYakovlev
    @ArtemYakovlev 5 днів тому

    Amazing story. Thanks!
    Share More like this

  • @highskai.
    @highskai. 6 днів тому +3

    first

  • @myleft9397
    @myleft9397 4 дні тому +2

    Just discovered your channel. Great video. I need that shirt! Your store says it's closed.

  • @JohnMitchellCalif
    @JohnMitchellCalif 5 годин тому

    that story is beyond effing bananas! So wonderful! Thanks for posting

  • @kalef1234
    @kalef1234 5 днів тому +1

    I wish I could learn cyber security like this. It seems so valuable. All I know is how to code.

  • @djh1455
    @djh1455 6 днів тому

    Thanks again for great deep dive, but more so the context at each step. This channel seems like a great mix thusfar in terms of techy something required for context, but detailed and techy explanations past said entry point for viewers.

    • @djh1455
      @djh1455 6 днів тому

      but also not surprised.. cheapo LED bulbs are front of mind, but "ROUTERS"?? from the ISP?? using 10 year code with upstream bugs known, but yet to be patched?? GASP!