[AusNOG] Preparing 100s of routers for resale
Karl Auer
kauer at biplane.com.au
Thu Apr 12 21:06:50 EST 2012
On Thu, 2012-04-12 at 20:52 +1000, Tom.Minchin at csiro.au wrote:
> Depends how paranoid you are and how well the device and cf card
> levels the wear - might have to write a very long config or numerous
> random files until you were sure every block had been overwritten.
Removing all files and writing a file of random data large enough to
fill the device would do the trick, though someone with sufficient
resources could probably still extract something. A destructive format
would probably work too.
> May just be easier to change the default passwords on the network gear
> that remains behind...
The passwords are just one part of a data set that potentially exposes
quite a lot of information about the network the devices used to be part
of.
If it was me, I'd do as you suggest and sell the devices sans flash or
nvram.
But I'm the sort of chap that takes a sledgehammer to his old hard
drives and mobile phones, even though there is nothing of interest on
them at all :-)
Regards, K.
--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Karl Auer (kauer at biplane.com.au)
http://www.biplane.com.au/kauer
GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 230 bytes
Desc: This is a digitally signed message part
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20120412/7fcdfb41/attachment.sig>
More information about the AusNOG
mailing list