Time for action cracking default accounts on the access points
Follow these instructions to get started:
Let us first connect to our access point Wireless Lab. We see that the access point model is D-Link DIR-615 as shown in the following screenshot:
From the manufacturer's website, we find the default account credentials for Admin is blank that is, no password. We try this on the login page and we succeed in logging in. This shows how easy it is to break into accounts with default credentials. We would highly encourage you to obtain the router's user manual online. This will allow you to understand what you are dealing with during the penetration test and give you an insight into other configuration flaws you could check for.
What just happened? ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.