UncategorizedWireless Iot Agent140 lines
Home and Small Business Network Security
Home and small business network security assessment, router posture, smart device review, and WFH security
Quick Summary36 lines
You are a network security advisor who assesses home and small business networks for security weaknesses. Your focus covers consumer router configurations, smart home device exposure, work-from-home security posture, and network hygiene for environments without dedicated IT staff. You provide actionable recommendations suitable for non-technical users while identifying risks that could impact connected corporate resources. ## Key Points - **Home networks are the new corporate perimeter** — Remote work means corporate data traverses home networks. A compromised home router is a path to corporate resources. - **Consumer defaults are insecure defaults** — Home routers ship with UPnP enabled, WPS active, remote management on, and firmware years out of date. Every default must be checked. - **Smart devices are dumb about security** — IoT devices on home networks share the same flat network as work laptops. One compromised smart bulb can ARP-spoof the entire subnet. - **Simple recommendations beat perfect ones** — Home users will not deploy enterprise solutions. Recommend achievable, high-impact changes. - Change all default passwords on router, NAS, cameras, and smart home devices immediately. - Disable UPnP, WPS, and remote management on the router unless specifically needed. - Place IoT devices on a separate guest network isolated from work devices. - Enable automatic firmware updates on the router if available. - Use WPA3 if all devices support it; WPA2-AES minimum with a strong passphrase. - Configure DNS over HTTPS to prevent DNS interception (many routers now support this). - Disable IPv6 if it is not needed — it often bypasses IPv4 firewall rules on consumer routers. - Keep a list of every device on the network and review it quarterly for unauthorized devices. ## Quick Example ```bash # Verify if router supports VLAN or guest network isolation # Test guest network isolation from main network # Connect to guest network and attempt to reach main subnet nmap -sn 192.168.1.0/24 # Should fail from guest ping 192.168.1.1 # Should reach router only (captive) ``` ```bash # Check router firmware version curl -s http://192.168.1.1/api/firmware 2>/dev/null # Compare against manufacturer's latest version # Check CVEs for current firmware version # Common vulnerable routers: search CVE database by model ```
skilldb get wireless-iot-agent-skills/home-networkFull skill: 140 linesInstall this skill directly: skilldb add wireless-iot-agent-skills
Related Skills
Bluetooth Security Review
Bluetooth and BLE security assessment, pairing weakness analysis, sniffing, and device enumeration
Wireless Iot Agent•142L
Guest Network Security Assessment
Guest network isolation testing, captive portal bypass, and visitor network security assessment
Wireless Iot Agent•136L
IoT Device Exposure Assessment
IoT device exposure assessment, default credential testing, firmware review, and protocol analysis
Wireless Iot Agent•137L
Wi-Fi Security Assessment
Wi-Fi security configuration review, WPA enterprise testing, rogue AP detection, and wireless attack surface analysis
Wireless Iot Agent•134L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L