#Hack router port 53 tcp password
They can then connect via telnet and try default passwords, brute force with hydra, etc.īut what can they do even if they find the password (or if none is set). Too many fingerprints match this host to give specific OS detailsĪs I understand it, if users (hackers) scan dymanic IP addresses with nmap then they are likely to find some home routers. |_dns-recursion: Recursion appears to be enabled
You can also try -sV -sT which tries to actually connect to the port, or use a -sM which sends a FIN/ACK to try and force a reset or RST packet response from the device, to prove the port is open or closed or just that a device is alive.Ĩ0/tcp open http Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)ħ547/tcp open http Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)ĥ3/udp open domain ISC BIND (Fake version: Nominum Vantio 5.2.0.1) sV -sC (standard scan) will tell you the service and version running if it can grab a banner from it or identify the service itself. Sometimes, a port can say its open, when really it isn't too depending on mangled packets or just crappy product design they can fail open and closed if continually scanning, and be randomness, so try various scans, as well as try the same ones with the UDP switch added as well, since some things, only show under UDP(but can often be false positives under UDP scans so not as reliable).
Go to or type "what is my IP address" into google and google should tell you as the first result in bold(google knows everything).
Try from a remote machine to scan your home IP if you can, which should hit your router, and that to me would be a better test.Īlso, try several other scans for various results at getting ports to pop and give up info, such as "nmap -v -A -PN -open -reason -sV -sC -p 1-65535 x.x.x.x" where x.x.x.x is your IP address. Scanning from local lan can sometimes lead to false positives, but I would try from an external scan just to be safe.