![]() ![]() found or custom made scripts for exploiting a certain vulnerability) for getting a better understanding of potential risks that found vulnerabilities pose. Investigate found exploits and try a practical exploitation of these vulnerabilities on a given TP Link TL-WR841N router (i.e.Check CVE lists for published known exploits found within the router's software and check their severity score.Find firmware and a list of software installed within the router.Intercept and analyze network traffic of the router.Gather of technical and network information about the router.The plan of TP Link TL-WR841N router cybersecurity analysis is as follows: Although some time in the future I might do some more throughout security analysis of TP Link TL-WR841N router. As of now, this is more of a gathering of the technical and network information about the router and gathering information about security vulnerabilities associated with the software installed within the router, as disclosed in Common Vulnerabilities and Exposures (CVE) lists. TP Link TL-WR841N router cybersecurity analysisįor a final project of my Bachelor's studies I have conducted a security test of a Besder 6024PB-XMA501 IP Camera and after that I have decided to do an overview of the security of the TP Link TL-WR841N router that I have used for the IP camera's security investigation.Github Pages version of this analysis can be found by following this link Table of Contents TP Link TL-WR841N router cybersecurity analysisĬyber security analysis of TP Link TL-WR841N router. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |