Routing protocols manage networks around the world. They are even used to decide where packets go on the Internet. In this video I'll show you how to add fake EIGRP routes to Cisco routers. You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good. Learn to code. Learn Linux. Learn Networking. ===== Menu: ===== 0:00 ▶ Hacking Routing protocols 1:00 ▶ What's we doing in this hack 2:31 ▶ Python scapy script explanation 8:50 ▶ Kali setup 9:59 ▶ Run script and see results 10:57 ▶ View fake routes on Cisco router ====== Scripts: ====== EIGRP route injection: davidbombal.wiki/eigrprouteinject Playlist: davidbombal.wiki/scapy ============== Scapy Resources: ============== Website: scapy.net/ Documentation: scapy.readthedocs.io/en/latest/ Scapy installation: =============== sudo apt update sudo apt install python3-pip sudo pip3 install scapy ================ Connect with me: ================ Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RU-vid: ru-vid.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #python #scapy
You make staying up to date easier, David! Thank you for creating new content, it is time consuming to you, we know, for that reason the vast majority of us are very appreciative!
I’ve studied 4 years at IT college but a single video tutorial of you gives me more information and knowledge than those 4 years of my college study Best regards,
Hi David! Great content on your page, following everything on a 100%! Since you was asking what content we would like to see, I will be more than happy to have some educational examples on "how to penetrate (ethically of course) a hypervisor (Type 1/2).
Did the BGP hacking video come out yet? I'd love to see the same thing done but against BGP. It seems like you need to know the neighbor relationship in order to forge packets. If a router receives routes from a device it doesn't have a relationship with imagine those packets will get dropped.
I have a request: please make a video about "how to access router admin page without connecting that wifi network" hope you think about this topic. and thanks again for sharing wonderful content with us
-Great content Professor David...!!! -That's exactly what we always talk about, what is the evolution of our profession as network engineers more and more becomes Blue Team or the first line of mitigation of all types of attacks that we may suffer. -And attackers each use more points than before were even considered to protect routing protocols and others against injection attacks on routing protocols like BGP, EIRGP or OSPF like the one you showed or others of DNS, or DHCP or layer higher those of SQL, etc. -The world has changed and safety has become a priority. -Asking once more: Please Professor David take a course focused on preparatory security for Cisco's CyberOps Associate for example. -Thanks for the knowledge...!!!
Hello David. First of all thanks for sharing these videos and courses. I'm writing this comment to get some guidance. I'm a game programmer, indie and new to this field. My schedule is very tight but I want to learn hacking. I'm a bit old to switch careers but this field (hacking) inspires me a lot. I just can't get enough time out to learn. I'll be glad to have your experience words on this.
Thankyou so much, as always you don't make one video about one thing and leave it. You are doing this scapy series but inside that also you are contionuing videos as you said you will show more protocols, tysm.
Thank you so much David for this video now I can block few websites as my younger sis is very much into other activities on the internet instead of her studies ❤
Thankyou for such informative video, please continue the series , also You are the Best Teacher, also Thankyou for the all Giveaways you do it helps alot.
I'm not sure if this is an appropriate suggestion, but, would it ever be possible to perhaps make a video on helium mining devices? Just thought I'd ask as you're an amazing teacher...
Thank you so much for your videos David. I just got into ethical hacking about two months ago and your videos are very easy to understand. I’m wondering if you could tell us which IDE you’re using in this or if you’d be up for creating an updated IDE recommendations video. Cheers
thank you very much sir, i am I new in this trick I'm working in a company to secure their company I learned a lot from your videos. thanks again help me tp improve my self more and more please
Will you please upload a video about what to do after installing kali linux for the first time ,things to do with it and a guide.please consider it,it'll help alot as me
David I would like to ask you about your opinion on netacad courses, would you recommend them (networking, cyber security, etc) to a beginner, but to a more advanced person?
A very interesting video, but I would like to clarify one point. It turns out that for route injection I only need the external address of the router and some knowledge about internal addressing? Or does the attacked router have to have a specific misconfiguration set? If so, which one?
Iam trying to learn ethical hacking. I literally have no knowledge abt coding. Pls guide me how to start. Feel free to provide me some RU-vid links also.
11:45 1.How do you change the configuration in the routers? 2. Do the standard ISP routers have the option in the first place or do I have to use something like Cisco routers? Is it for average home users necessary (no home office etc.) to use these protocols or more for companies?
Hi David, thanks so much for videos they really got me thinking differently with the security in our business. Quick question, you mostly attack Cisco, will these work on Microtik router. Have you hacked Microtik ...ethically that is 😅
I typically attack Cisco as they are the biggest networking vendor in the world. Also used by the biggest number of corporate networks out there. I'll have to do some tests against Microtik 😀
@@davidbombal Thanks David I would appreciate if you did. Thanks again for a great channel....oh did i hear you still have a ADSL....Do they still have ADSL in the UK?
Hi sir, I've started following your channel recently. I've installed kali linux on a seperate pc, where do I start in your videos to know the basic tools and use them. Thanks in advance
Hi David, I'm thinking about joining the bachelor's math course, they say it improves the codes in python, could you give me your opinion? thank you very much for the content....
This can only be done when the attacker is already connected to the network right? What kind of securities do modems have to prevent unwanted external brake ins? Also since modems and routers only allow the web interface to be accessed with an local IP address is there a way to spoof your external ip address so that the targetted modem thinks it's a local address?
Thank you for another excellent video. I wanted to ask, would it be possible to use a network simulator like GNS3 and run these scripts against the simulated devices?
Sir can we cure the process? I mean for example a hacker had done like this to me then how can I cure it myself ? If I can, then from which source? Should I have Linux installed? Or it's not necessary?