Jump to content

nintendo switch


XDDDDDDD

Recommended Posts

Anything connected through a compromised WiFi network has the propensity of being targeted and being compromised.

However by shear definition a RAT is not a virus.  A RAT is the acronym for Remote Access Trojan.

Just like a Chevrolet is not a Ford, a virus is not a trojan. 

All Chevrolets and Fords are automobiles just like all viruses and trojans are malware.

Some notes on WiFi security

  • Disable acceptance of ICMP Pings
  • Change the Default Router password using a Strong Password
  • Use a Strong WiFi password on WPA2 using AES encryption or Enable WPA3 if it is an option.
  • Disable Remote Management
  • Create separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another.
  • Change the network name (SSID).  Do not use your; Name, Postal address or other personal information.  Make it unique or whimsical and known to your family/group.
  • Is the Router Firmware up-to-date ?  Updating the firmware mitigates exploitable vulnerabilities.
  • Specifically set Firewall rules to BLOCK;   TCP and UDP ports 135 ~ 139, 445, 1234, 3389, 5555 and 9034
  • Many Routers support Saving and Restoring settings from a file.  It is suggested to make a backup by saving your Router's settings once it has been configured.
  • Document passwords created and store them in a safe but accessible location.

 

  • Like 1
Link to post
Share on other sites

6 hours ago, David H. Lipman said:

Anything connected through a compromised WiFi network has the propensity of being targeted and being compromised.

However by shear definition a RAT is not a virus.  A RAT is the acronym for Remote Access Trojan.

Just like a Chevrolet is not a Ford, a virus is not a trojan. 

All Chevrolets and Fords are automobiles just like all viruses and trojans are malware.

Some notes on WiFi security

 

  • Disable acceptance of ICMP Pings
  • Change the Default Router password using a Strong Password
  • Use a Strong WiFi password on WPA2 using AES encryption or Enable WPA3 if it is an option.
  • Disable Remote Management
  • Create separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another.
  • Change the network name (SSID).  Do not use your; Name, Postal address or other personal information.  Make it unique or whimsical and known to your family/group.
  • Is the Router Firmware up-to-date ?  Updating the firmware mitigates exploitable vulnerabilities.
  • Specifically set Firewall rules to BLOCK;   TCP and UDP ports 135 ~ 139, 445, 1234, 3389, 5555 and 9034
  • Many Routers support Saving and Restoring settings from a file.  It is suggested to make a backup by saving your Router's settings once it has been configured.
  • Document passwords created and store them in a safe but accessible location.

 

 

how do i create separate subnets on my network? do i use vlans or something?

Link to post
Share on other sites

You could use a VLAN but it would depend on the Router.

Many Routers support Guest Networks and that segregates traffic.

 

References:

 

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
  • Like 1
Link to post
Share on other sites

5 hours ago, David H. Lipman said:

You could use a VLAN but it would depend on the Router.

Many Routers support Guest Networks and that segregates traffic.

 

References:

 

 

for the switch references i see that the accounts got hacked not the switches themselves

Link to post
Share on other sites

This Vulnerability goes back to 2022 but was updated

https://nvd.nist.gov/vuln/detail/CVE-2022-47949

So an Exploitation is possible but is not known to have occurred on unpatched systems.

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
  • Like 1
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.