The “I Can Use Facebook Any Time I Want To” Offspring Password Reset Attack
No matter how ridiculous, every "cyberthreat" must have a catchy name.
Sometimes parents will restrict the times that a child can use the Internet for anything other than homework or downloading Malwarebytes to fix their parent’s PC. Policy and compliance, as every parent and IT professional know, are not always followed by choice. If you are a parent, how do you enforce such a policy? Technology to the rescue…
Many cable modems, and other network connectivity devices, allow the administrator to set up times they can block certain computers from using specific Internet sites. Of course that doesn’t work if you leave the default administrator username and password unchanged. It’s either on the Internet, or on a sticker on the bottom of the device.
Since you already knew that, or someone who did know that helped you configure the device, your kid isn’t going to log in to the console and fix the “policy.” Here is where the old adage about physical access and game over come into play. Simply stated, if a person has physical access to a device, they own it. If your teenager has physical access to the network device, they can perform an insidious password reset attack and you will never be the wiser. There’s a reset button on the device. Among other things the reset button resets the... yeah, password. You may never know it happened until 25 years later when during some random conversation your kid confesses. At that time, if your kid still lives at home, go ahead and enforce lockout hours again. The defense against the offspring password reset attack is to prevent physical access to the device. For the average parent that would be
a pain in the @ss
inconvenient. I’m not a parent so it isn’t really my problem, I’m just the
Before you state the obvious, there are parental control apps that can enforce policy on a mobile phone. These apps are almost certainly more common than parents doing anything with their cable modem configurations. If you’re a kid, that’s what burner phones are for.
OK, the attack is esoteric and it just amused me, but the point is that sometimes physical security is required where you least expect it. Perhaps next time I will discuss the legal implications of the offspring password reset attack, but don’t lock up your kids yet.
By the way, I recommend using a password manager and keeping both your current username and password in it and the default username and password. For one, it can be
a pain in the @ss inconvenient to turn over
the device with all of those network cables and the stiff coaxial cable
attached on order to see the sticker with the password on the bottom. For
another, if anything happens to the sticker with the password, and it is a modem
specific password, you are now vulnerable to a password lockout attack. I find
it embarrassing to tell my ISP that my cat licked off the cable modem sticker….
especially the second time.
Independent Security Analyst with a Stranger Sense of Danger