The analysis shows that the attacker is particularly interested in ports 20, 21, 25, 110, and 144, which are for FTP-data, FTP, SMTP, POP3, and IMAP traffic
Uhh, that's 143 for IMAP. 144 is for "NewS window system" or "Universal Management Architecture".
Patches were released by Mikrotik in April. The upgrades are easy - just a few mouse clicks. Configuring automatic upgrades is also easy. Out of the box, the routers come with a secure WAN configuration.
Given this scenario, if users do not upgrade their router for a significant period of time, and/or configure the routers in a insecure manner, I would not apportion much blame on the supplier.
All routers have had vulnerabilities. The question is how quickly the manufacturer fixes them, if the vulnerabilities
For someone in the security community to not know the significance of sniffing SNMP traffic is quite sad. Having the community strings would give an attacker the ability to map out every device on the entire network. In some cases the right community strings would give them access to change the configuration of the routers, firewalls and switches on the network. SNMP v1 and v2 are not secure.
have you inspected the source code? No, so do not use them. Just put your PC on the internet and use hosts files protection from /.
I don't use Winbox.
The analysis shows that the attacker is particularly interested in ports 20, 21, 25, 110, and 144, which are for FTP-data, FTP, SMTP, POP3, and IMAP traffic
Uhh, that's 143 for IMAP. 144 is for "NewS window system" or "Universal Management Architecture".
Patches were released by Mikrotik in April. The upgrades are easy - just a few mouse clicks. Configuring automatic upgrades is also easy. Out of the box, the routers come with a secure WAN configuration.
Given this scenario, if users do not upgrade their router for a significant period of time, and/or configure the routers in a insecure manner, I would not apportion much blame on the supplier.
All routers have had vulnerabilities. The question is how quickly the manufacturer fixes them, if the vulnerabilities
For someone in the security community to not know the significance of sniffing SNMP traffic is quite sad.
Having the community strings would give an attacker the ability to map out every device on the entire network. In some cases the right community strings would give them access to change the configuration of the routers, firewalls and switches on the network. SNMP v1 and v2 are not secure.