Тёмный

Hacking Routers with Python // Fake route injection to BLACK HOLE networks 

David Bombal
Подписаться 2,6 млн
Просмотров 62 тыс.
50% 1

Опубликовано:

 

4 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 200   
@davidbombal
@davidbombal 3 года назад
Routing protocols manage networks around the world. They are even used to decide where packets go on the Internet. In this video I'll show you how to add fake EIGRP routes to Cisco routers. You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good. Learn to code. Learn Linux. Learn Networking. ===== Menu: ===== 0:00 ▶ Hacking Routing protocols 1:00 ▶ What's we doing in this hack 2:31 ▶ Python scapy script explanation 8:50 ▶ Kali setup 9:59 ▶ Run script and see results 10:57 ▶ View fake routes on Cisco router ====== Scripts: ====== EIGRP route injection: davidbombal.wiki/eigrprouteinject Playlist: davidbombal.wiki/scapy ============== Scapy Resources: ============== Website: scapy.net/ Documentation: scapy.readthedocs.io/en/latest/ Scapy installation: =============== sudo apt update sudo apt install python3-pip sudo pip3 install scapy ================ Connect with me: ================ Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RU-vid: ru-vid.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #python #scapy
@sachindayal3794
@sachindayal3794 3 года назад
Is this only for cisco router ?
@davidbombal
@davidbombal 3 года назад
@@sachindayal3794 This specific routing protocol is used by Cisco routers. I'll cover BGP and OSPF in other videos.
@cgmarch2359
@cgmarch2359 3 года назад
@@davidbombal should work only if the eigrp/ospf is in same vlan with attacker right?
@cocplayers4459
@cocplayers4459 3 года назад
Thanks but I don't why it was send the fake ip and how to fix it
@sigo2076
@sigo2076 3 года назад
YOU'RE THE BEST TEACHER EVER
@davidbombal
@davidbombal 3 года назад
Thank you very much!
@ivanrg9237
@ivanrg9237 3 года назад
You make staying up to date easier, David! Thank you for creating new content, it is time consuming to you, we know, for that reason the vast majority of us are very appreciative!
@yasiritpro3238
@yasiritpro3238 3 года назад
I’ve studied 4 years at IT college but a single video tutorial of you gives me more information and knowledge than those 4 years of my college study Best regards,
@Rake141
@Rake141 3 года назад
I was really looking forward to this video! Hopefully this series continues.... thank you david!
@sjslife
@sjslife 3 года назад
I’m enjoying everything you upload bro, I’m still here studying every day no bs Dave, love from Manchester
@sawkorap69
@sawkorap69 3 года назад
You and network chunks is the best teacher of hacking ...
@vpetyr
@vpetyr 3 года назад
Hi David! Great content on your page, following everything on a 100%! Since you was asking what content we would like to see, I will be more than happy to have some educational examples on "how to penetrate (ethically of course) a hypervisor (Type 1/2).
@nicholassattaur9964
@nicholassattaur9964 3 года назад
Wow 😲 this is amazing and insightful content! Thanks David and loving the series
@kellenrivers5466
@kellenrivers5466 3 года назад
Love the video! I use EIGRP all of the time and it is good to see the importance of good security practices. Thanks David! You're crushing it.
@JCSantiago
@JCSantiago 3 года назад
Did the BGP hacking video come out yet? I'd love to see the same thing done but against BGP. It seems like you need to know the neighbor relationship in order to forge packets. If a router receives routes from a device it doesn't have a relationship with imagine those packets will get dropped.
@mdanas7481
@mdanas7481 3 года назад
I have a request: please make a video about "how to access router admin page without connecting that wifi network" hope you think about this topic. and thanks again for sharing wonderful content with us
@pranavaraoperuvaje2089
@pranavaraoperuvaje2089 3 года назад
I was waiting for Ethical Hacking video, your Python tools helped me. Thank you David Sir
@kalindugim4918
@kalindugim4918 3 года назад
Thank you David Sir . You are the best teacher ever . I love your content.
@razredge68
@razredge68 3 года назад
Still not able to turn on notifications for this channel. Bell automatically switches to none.
@jaimerosariojusticia
@jaimerosariojusticia 3 года назад
AWEsome! I was about to request this sort of content. Thanks for the content as always.
@jaysongalicia8142
@jaysongalicia8142 3 года назад
This is some scary stuff… and it's awesome, I love it! The Networking knowledge really helps. Thanks David
@davidbombal
@davidbombal 3 года назад
Glad you enjoyed it!
@codegreat8201
@codegreat8201 3 года назад
You are legend of cybersecurity a best teacher ❤️❤️❤️
@educastellini
@educastellini 3 года назад
-Great content Professor David...!!! -That's exactly what we always talk about, what is the evolution of our profession as network engineers more and more becomes Blue Team or the first line of mitigation of all types of attacks that we may suffer. -And attackers each use more points than before were even considered to protect routing protocols and others against injection attacks on routing protocols like BGP, EIRGP or OSPF like the one you showed or others of DNS, or DHCP or layer higher those of SQL, etc. -The world has changed and safety has become a priority. -Asking once more: Please Professor David take a course focused on preparatory security for Cisco's CyberOps Associate for example. -Thanks for the knowledge...!!!
@patrickilunga1535
@patrickilunga1535 3 года назад
Hi Eduardo . longtime I read your content on linkedin
@educastellini
@educastellini 3 года назад
@@patrickilunga1535 Thanks, I only want to help...
@imranexd279
@imranexd279 Месяц назад
Truly amazing guy i hope that you reach more people so they can learn from you
@LaluKumar-cx1yg
@LaluKumar-cx1yg 3 года назад
Hello David. First of all thanks for sharing these videos and courses. I'm writing this comment to get some guidance. I'm a game programmer, indie and new to this field. My schedule is very tight but I want to learn hacking. I'm a bit old to switch careers but this field (hacking) inspires me a lot. I just can't get enough time out to learn. I'll be glad to have your experience words on this.
@idhantsood1105
@idhantsood1105 3 года назад
Thankyou so much, as always you don't make one video about one thing and leave it. You are doing this scapy series but inside that also you are contionuing videos as you said you will show more protocols, tysm.
@yasiritpro3238
@yasiritpro3238 3 года назад
Networking owes you Mr.David Love you and your tutorials ❤️
@gjsatru3383
@gjsatru3383 3 года назад
Great David your content's are just awsome. I never skip the video and everytime I like it .
@davidbombal
@davidbombal 3 года назад
I appreciate that!
@laureanocavallo2476
@laureanocavallo2476 3 года назад
As always, a pleasure to watch your videos. Greetings from Argentina
@ashishashish-di3cg
@ashishashish-di3cg 3 года назад
It's useful make more videos on this topic
@rashidali665
@rashidali665 3 года назад
Thank you so much David for this video now I can block few websites as my younger sis is very much into other activities on the internet instead of her studies ❤
@abdallamohamed5844
@abdallamohamed5844 3 года назад
so much love from Egypt ❤️❤️❤️
@lucasfontini5881
@lucasfontini5881 3 года назад
Awesome vídeo David, I'm always been learning with those videos
@aum7463
@aum7463 3 года назад
Thankyou for such informative video, please continue the series , also You are the Best Teacher, also Thankyou for the all Giveaways you do it helps alot.
@hollylee830
@hollylee830 3 года назад
I'm not sure if this is an appropriate suggestion, but, would it ever be possible to perhaps make a video on helium mining devices? Just thought I'd ask as you're an amazing teacher...
@techymoh
@techymoh 3 года назад
Now that's scary. Most admins may not be using strict authentication mechanism while networking and routing stuffs. Hi btw..
@Htt381
@Htt381 3 года назад
Thank you so much for your videos David. I just got into ethical hacking about two months ago and your videos are very easy to understand. I’m wondering if you could tell us which IDE you’re using in this or if you’d be up for creating an updated IDE recommendations video. Cheers
@jcup2sumthin
@jcup2sumthin 3 года назад
Greetings David! I really enjoyed watching this video, but I’m not good at using Python as of yet and I’d really like to learn.
@alisougouma1489
@alisougouma1489 3 года назад
thank you very much sir, i am I new in this trick I'm working in a company to secure their company I learned a lot from your videos. thanks again help me tp improve my self more and more please
@noahfahem3739
@noahfahem3739 3 года назад
David , you're the 100% of the 100%🔥❤️
@MrRobot222
@MrRobot222 3 года назад
Great video as always, thank you. Perhaps a follow-up on how to protect against these DOS attacks?
@valentin7740
@valentin7740 3 года назад
Interesting to learn something new. Im not programmer or something like that but method who i use is to scan for wps pin and get password via wps
@AliXDream9
@AliXDream9 2 года назад
Thank you David for this free wonderful videos thank you for your handwork
@davidbombal
@davidbombal 2 года назад
You are very welcome
@bronxandbrenx
@bronxandbrenx 3 года назад
This will help me in the future. Thank you so much Sir DB :)
@sayantan-bal
@sayantan-bal 3 года назад
Carry on uploading this type videos ❤️
@anonymoushacker2860
@anonymoushacker2860 3 года назад
we love you'r teaches sir *WE GALD TO LEARN WITH YOU*
@zukxxxx0
@zukxxxx0 3 года назад
Will you please upload a video about what to do after installing kali linux for the first time ,things to do with it and a guide.please consider it,it'll help alot as me
@2020mohamed
@2020mohamed 3 года назад
you are awsome, thanks from EGYPT
@corpsecoder5216
@corpsecoder5216 3 года назад
This is great i been getting into hardware hacking and this is perfect thank you david bombal
@ahmetsoykan1140
@ahmetsoykan1140 3 года назад
Hi, Can you please make a list the videos these you have posted? So we can easily choose what to watch and learn.
@yosefa_da_uso
@yosefa_da_uso 3 года назад
Sir thank you so much for all your videos..it really helps..God bless..10000 sub♥️
@sergioeduard4422
@sergioeduard4422 3 года назад
David I would like to ask you about your opinion on netacad courses, would you recommend them (networking, cyber security, etc) to a beginner, but to a more advanced person?
@arnoldparas3043
@arnoldparas3043 3 года назад
Thank you so much sir David. This is very useful for me.
@Lazy_IT
@Lazy_IT 3 года назад
A very interesting video, but I would like to clarify one point. It turns out that for route injection I only need the external address of the router and some knowledge about internal addressing? Or does the attacked router have to have a specific misconfiguration set? If so, which one?
@Lazy_IT
@Lazy_IT 3 года назад
David?
@JohnDoe-sm7vw
@JohnDoe-sm7vw 3 года назад
David it's the day today i am very happy to tell you that I have Passed OSCP at 17 *
@davidbombal
@davidbombal 3 года назад
Congratulations! Well done!
@JohnDoe-sm7vw
@JohnDoe-sm7vw 3 года назад
@@davidbombal Thanks a lot sir it would not have been possible without you :)
@scottym50
@scottym50 3 года назад
I love it. Thank you for your great video.
@ghulamrasoulmustafavy7269
@ghulamrasoulmustafavy7269 3 года назад
thank you sir, great video with great explanation
@mfawzi89
@mfawzi89 3 года назад
I press the like button just after opening the video no need to wait till the end. The good result is guaranteed 😕
@guilherme5094
@guilherme5094 3 года назад
And thanks again David!
@krishnasharma5843
@krishnasharma5843 3 года назад
You are amazing SIR...LITERALLY
@anonymous25ja
@anonymous25ja 3 года назад
Lots of ❤️ love.... from us 😀
@seyu8666
@seyu8666 3 года назад
Please make a video on OSPF. Thanks a lot for this
@roykoren5171
@roykoren5171 3 года назад
Amazing content as always
@8Jallin
@8Jallin 3 года назад
Good stuff David! Thanks a lot.
@gauthamgamer1214
@gauthamgamer1214 3 года назад
Iam trying to learn ethical hacking. I literally have no knowledge abt coding. Pls guide me how to start. Feel free to provide me some RU-vid links also.
@musictube7805
@musictube7805 3 года назад
There is no one like you
@developersplace7312
@developersplace7312 3 года назад
Sir your Video is just That A mazing you are my idol
@Bigmike83007
@Bigmike83007 3 года назад
11:45 1.How do you change the configuration in the routers? 2. Do the standard ISP routers have the option in the first place or do I have to use something like Cisco routers? Is it for average home users necessary (no home office etc.) to use these protocols or more for companies?
@deanvanrensburg3285
@deanvanrensburg3285 3 года назад
Hi David, thanks so much for videos they really got me thinking differently with the security in our business. Quick question, you mostly attack Cisco, will these work on Microtik router. Have you hacked Microtik ...ethically that is 😅
@davidbombal
@davidbombal 3 года назад
I typically attack Cisco as they are the biggest networking vendor in the world. Also used by the biggest number of corporate networks out there. I'll have to do some tests against Microtik 😀
@deanvanrensburg3285
@deanvanrensburg3285 3 года назад
@@davidbombal Thanks David I would appreciate if you did. Thanks again for a great channel....oh did i hear you still have a ADSL....Do they still have ADSL in the UK?
@mdanas7481
@mdanas7481 3 года назад
great video .. very informative.. thank you for sharing .. love form ( Bangladesh )
@gregm.6945
@gregm.6945 3 года назад
thanks for another great video David !
@vj-595
@vj-595 3 года назад
Hi sir, I've started following your channel recently. I've installed kali linux on a seperate pc, where do I start in your videos to know the basic tools and use them. Thanks in advance
@stark6314
@stark6314 3 года назад
Great sir I am interested ❤️👍🏻
@thiramithukulasooriya4521
@thiramithukulasooriya4521 3 года назад
Thanks for the video ..
@adithyaroy6805
@adithyaroy6805 3 года назад
nice work man i love your videos
@ShinigamiAnger
@ShinigamiAnger 3 года назад
Loving these videos, thank you.
@TANKBM
@TANKBM 3 года назад
I have been eagerly waiting for this video
@davidbombal
@davidbombal 3 года назад
Really happy to hear that!
@vyasG
@vyasG 3 года назад
Thank you. Great Video.
@kassianolopes8831
@kassianolopes8831 3 года назад
Hi David, I'm thinking about joining the bachelor's math course, they say it improves the codes in python, could you give me your opinion? thank you very much for the content....
@davidbombal
@davidbombal 3 года назад
Not required for Ethical hacking or networking. Probably be good if you want to do Data Science as a career.
@sjakal3n70
@sjakal3n70 2 года назад
Good morning, do you really need to run Kali in a virtual machine, if not what kind of security will you need to block your IP from being tracked?
@muhammadistiqlal8108
@muhammadistiqlal8108 3 года назад
hi David, what's your primary mac type ? intel / silicon ?
@davidbombal
@davidbombal 3 года назад
I have an older Intel Mac as my main computer. Will upgrade sometime this year or next I think to M1
@munseer15
@munseer15 3 года назад
please make python beginner to advanced course
@SirPeterlll
@SirPeterlll 3 года назад
This can only be done when the attacker is already connected to the network right? What kind of securities do modems have to prevent unwanted external brake ins? Also since modems and routers only allow the web interface to be accessed with an local IP address is there a way to spoof your external ip address so that the targetted modem thinks it's a local address?
@Jenko022
@Jenko022 3 года назад
Thank you for another excellent video. I wanted to ask, would it be possible to use a network simulator like GNS3 and run these scripts against the simulated devices?
@davidbombal
@davidbombal 3 года назад
Yes you can 😀 in some of the other videos I am using GNS3
@amethyst_academy
@amethyst_academy 3 года назад
Can't wait to destroy my neighbours router!:3
@iampro.3865
@iampro.3865 3 года назад
Nice content, Mr. Thanks for sharing.
@anikethsai2194
@anikethsai2194 3 года назад
Sir can we cure the process? I mean for example a hacker had done like this to me then how can I cure it myself ? If I can, then from which source? Should I have Linux installed? Or it's not necessary?
@shamitjaat1085
@shamitjaat1085 3 года назад
Great😊😊😊😊😊😊 I love your content sir😄😄😄😄 You are my idol sir ❤❤
@anay3356
@anay3356 3 года назад
Helpful video sir 👍👍👍
@CA-JOHN-DCOSTA
@CA-JOHN-DCOSTA 3 года назад
Sir your video is informative 👍
@KL-og8gg
@KL-og8gg 3 года назад
Can you do some phone systems hacking videos? SIP, RTP, VoIP etc.
@lizardo7993
@lizardo7993 3 года назад
Can you talk about the recent hack to T-Mobile‘s routers and can you explain what the hacker did and why he said it was so easy?
@aspecty9413
@aspecty9413 3 года назад
0:48 Sure ❤️
@ccnpseth4563
@ccnpseth4563 3 года назад
How effective is this with EIGRP security?
@islamimujahid3943
@islamimujahid3943 3 года назад
yo i love your videos and best content
@Child0ne
@Child0ne 3 года назад
Brilliant David
@sisu007
@sisu007 3 года назад
Man, GOD Bless You
@sparshbansal220
@sparshbansal220 3 года назад
Sir, You are a LEGEND!!
@noumanrussel1112
@noumanrussel1112 3 года назад
David? we need python tutorial to learn hacking..beginners to advance
@oyunvakti4761
@oyunvakti4761 3 года назад
@David Bombal add auto translate
@namelessbeats2328
@namelessbeats2328 3 года назад
how can you protect urself if u own a cicso router that uses this protocol? and do you need any special access to the router to apply this attack
@chandraprakashntc
@chandraprakashntc 3 года назад
😍😍😍😍😍😍😍😍😍🔥🔥🔥🔥🔥 #davidbombal
@seancantwell12
@seancantwell12 2 года назад
Can someone explain the “/“ used inside the sendp function parameters? I tried googling it but didn’t have much luck.
@mr.guljaan7175
@mr.guljaan7175 3 года назад
Sir how a phishing tool works. Guide us on all the coding and files needed for phishing.
Далее
Create fake Routers with python and scapy
7:18
Просмотров 34 тыс.
60 Hacking Commands You NEED to Know
27:01
Просмотров 466 тыс.
PERFECT PITCH FILTER.. (CR7 EDITION) 🙈😅
00:21
Просмотров 3,9 млн
When you Accidentally Compromise every CPU on Earth
15:59
Hacking Complex Passwords with Rules & Munging
16:55
Просмотров 103 тыс.
we ran OUT of IP Addresses!!
16:49
Просмотров 2,1 млн
Be Invisible Online and Hack like a Ghost
54:09
Просмотров 351 тыс.
Best Hacking Laptop 2023
33:44
Просмотров 941 тыс.
How Hackers Spy on you from your own WiFi!
12:23
Просмотров 714 тыс.