13 04, 2015
  • Get Your Tech On

DOCSIS Internet Security – internet security and recommended best practices Episode 11

2021-08-17T09:01:26-04:00April 13th, 2015|

DOCSIS Internet Security Episode 11 Brady Volpe was joined by John Downey, Dan Hegglin and Brian Wilson discussing the challenges cable operators face with DOCSIS internet security and recommended best practices they can follow to secure their networks from DDoS, DoS, DNS, High Value Targets and many more. More about Dan Hegglin of Cisco and Brain Wilson of Alcatel-Lucent Brian has been in the IT Security & Cable industry for just at 20 years. He started his career in the US Army in the Signal Corps and has worked since with many

14 08, 2012

DOCSIS Security | Uncapping Cable Modems

2012-08-14T10:57:21-04:00August 14th, 2012|

So what is uncapping cable modems? Uncapping cable modems refers to activities performed to alter a DOCSIS cable modems settings. Plain and simple someone is messing with the cable modem's configuration file to get what they want.  So what do they want?  Greater bandwidth (the need for speed), wanting more than one public IP, or any other configurable options a DOCSIS modem can offer.  Maybe they just want to prove they can do it and or feel they are getting the shaft from their cable provider.  Really the psychology of people is

1 08, 2010
  • Hacking DOCSIS Cable Modems

Hacking DOCSIS Cable Modems

2021-08-17T13:18:52-04:00August 1st, 2010|

Fundamental Precautions You Should Take to Secure Your Network DOCSIS security wholes are a serious problem, even if you are a major MSO (Multiple System Operator). Recently a reader contacted me and said that theft of service, especially uncapping cable modems via hacking, was still impacting his network. Not surprisingly, one vendor's CMTS was able to ward off the hacker's while another vendor's CMTS was unable to prevent the uncapping and subsequent theft of service. I will protect the vendor's identities because I believe that the CMTS is the first line of defense. Vendors have put into place very effective, CMTS specific techniques, such as Cisco's TFTP-Enforce which prohibits a cable modem from registering and coming on line if there is no matching TFTP traffic through the CMTS preceding the registration attempt. But often individual techniques are "hacked" (such as in the TFTP-Enforce bypass method found on hacker sites). What this indicates is that any reliance on a single point or method of hack-proofing your network WILL NOT WORK. You must implement a layered approach consisting of a number of CMTS, DHCP, TFTP and potentially SNMP and Kerbos related methods. The later would apply for MTAs and set top boxes. For now we will just focus on cable modems and the realm of CMTSs and DHCP/TFTP servers. Here are is the bare minimum of what you should be doing:

Go to Top