Default password

From Wikipedia, the free encyclopedia

Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup, or after resetting to factory defaults.

Manufacturers of such equipment typically use a simple password, such as admin or password on all equipment they ship, in the expectation that users will change the password during configuration. The default username and password is usually found in the instruction manual (common for all devices) or on the device itself.

Default passwords are one of the major contributing factors to large-scale compromises of home routers.[1] Leaving such a password on devices available to the public is a huge security risk.[2][3][4]

Some devices (such as wireless routers) will come with unique default router username and passwords printed on a sticker, which is a more secure option than a common default password. Some vendors will however derive the password from the device's MAC address using a known algorithm, in which case the password can be also easily reproduced by attackers.[5]

Default access[]

To access internet-connected devices on a network, a user must know its default IP address. Manufacturers typically use 192.168.1.1, and also 10.0.0.1 default router's IP address however, some will have variations on this. Similarly to login details, leaving this unchanged can lead to security issues.

See also[]

References[]

  1. ^ Niemietz, Marcus; Schwenk, Joerg (2015). "Owning Your Home Network: Router Security Revisited". arXiv:1506.04112 [cs.CR].
  2. ^ "The Risk of Default Passwords". Security Laboratory: Methods of Attack Series. SANS. Retrieved June 16, 2015.
  3. ^ Opaska, Walter P. (1986-09-01). "Closing the VAX Default Password "Backdoor"". EDPACS. 14 (3): 6–9. doi:10.1080/07366988609450370. ISSN 0736-6981.
  4. ^ Nam, Sungyup; Jeon, Seungho; Kim, Hongkyo; Moon, Jongsub (2020-05-31). "Recurrent GANs Password Cracker For IoT Password Security Enhancement". Sensors. 20 (11): 3106. Bibcode:2020Senso..20.3106N. doi:10.3390/s20113106. PMC 7309056. PMID 32486361.
  5. ^ "Reversing D-Link's WPS Pin Algorithm". Embedded Device Hacking. 31 October 2014. Retrieved June 16, 2015.
Retrieved from ""