Cybercriminal reveals how to hack with MikroTik

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • CDP flood attack using PCAP injection
  • НаукаНаука

Комментарии • 40

  • @userou-ig1ze
    @userou-ig1ze Год назад +11

    This series format is super interesting, but really, it's more valuable if you present red team AND blue team approach

  • @erikruwalder97
    @erikruwalder97 Год назад +5

    the pcap injection is quite nice to test frewall's

  • @nikolashuminosky6987
    @nikolashuminosky6987 Год назад

    @Druvis - is that any chance that we can test the firewall via traffic-generator.
    I think that someone mentioned about that on the MUM.
    Are u familiar with that?

  • @Nichomachean5
    @Nichomachean5 Год назад +3

    I have one thing to say about these new mikrotik videos.... MORE. :)

  • @123XAH
    @123XAH Год назад +9

    How to protect from above mentioned flood?

    • @pierromaximus
      @pierromaximus Год назад +2

      You have to disable cdp on interfaces, that dont need it.
      Another option is to configure port security.

    • @maigonis.elleris
      @maigonis.elleris Год назад +1

      @@pierromaximus Port security is not always option, besides, this can be passed thru WiFi.

    • @pierromaximus
      @pierromaximus Год назад +5

      @@maigonis.elleris You can isolate WIFI clients in separate VLAN and disable cdp on SVI interface.

  • @mikkio5371
    @mikkio5371 Год назад

    Druves .you are good ,where do you get all these knowledge from . Recommend books to me 🙏

    • @RB01-lite
      @RB01-lite Год назад

      The internet is the best resource. But if you want a good book here is one that I liked - 'The Art of Learning' by Josh Waitzkin.

  • @alimibrahem8120
    @alimibrahem8120 Год назад

    is it mendatory to use CDP packet ..? i mean if i want to test that on my router but i don't have Kali linux..!

  • @liviu2004
    @liviu2004 Год назад +1

    Great, we’ll use this pcap method to record and inject traffic in dynamic positioning ships networks, to increase confidentiality in redundancy machinery arrangements to sustain worst case failure. Thanks.

    • @userou-ig1ze
      @userou-ig1ze Год назад

      can you elaborate

    • @maxvideodrome4215
      @maxvideodrome4215 Год назад

      Hackers movie?

    • @RB01-lite
      @RB01-lite Год назад

      Just don't hack NASA

    • @mikrotik
      @mikrotik  Год назад

      Simply wait for the next video on how to protect yourself from dumb "hacks" like this :) and don't be so serious. If you have firewall, you are safe

    • @mikkio5371
      @mikkio5371 Год назад

      ​@@mikrotikdumb hack 😱😱meaning there are far more hacks to be aware of 😅

  • @zacohell
    @zacohell Год назад

    Is disabling neighbor discovery enough to protect the router from this attack?

    • @mikrotik
      @mikrotik  Год назад +2

      Yes, but even so, do not keep open ports to untrusted networks. To be extra safe, use VPN to access the router, all other ports should be firewalled.

  • @gomgom330
    @gomgom330 3 месяца назад

    Hei, is remote mikrotik through wifi with ssh more secure than remote it with winbox even if winbox port changed??

    • @mikrotik
      @mikrotik  3 месяца назад

      There is no straight answer to that, but it will be a lot more secure in both cases if you only connect through a tunnel. Wireguard is particularly good as it does not respond to port scans.

  • @DmitriyHaidai
    @DmitriyHaidai Год назад

    Could anyone help me? I followed all these steps and everything was going right way however my router doesnt have enough Total HDD memory for my injected file pcap. it is extremly larger than my router's HDD space.
    Obviously i cut down my file.pcap from 350Mb to 70 Mb and neighbor routers were not going to crash.
    I wonder to know what size of file.pcap do i need to overload neighbor routers?

    • @RB01-lite
      @RB01-lite Год назад

      Not sure. Perhaps you can use a USB drive. Alternatively a fun experiment might be write a script that generates raw data for traffic generator to inject ;)

  • @ronaldrobles5597
    @ronaldrobles5597 Год назад

    because the CPU goes up by 30% when updating v7

    • @mikrotik
      @mikrotik  Год назад +1

      Seems you paid too much, as you have 70% unused CPU resources 😎

  • @Dara.config
    @Dara.config Год назад

    What about the cpu of the router problem sir?

    • @mikrotik
      @mikrotik  Год назад

      What is the problem?

    • @Dara.config
      @Dara.config Год назад

      how about cpu if have hack on mikrotik sir@@mikrotik

  • @user-sl3fk5wd2d
    @user-sl3fk5wd2d 11 месяцев назад

    how show app yersinal grapn......?

  • @website-nv4qb
    @website-nv4qb Месяц назад

    hello

  • @AbdiKwon1445
    @AbdiKwon1445 8 месяцев назад

    this ddos ?

    • @mikrotik
      @mikrotik  8 месяцев назад

      It's dos, ddos means there are multiple devices used for the attack.

  • @kevinjosemarquez4801
    @kevinjosemarquez4801 11 месяцев назад

    Yo no Ingles

  • @boumarc
    @boumarc Год назад +1

    mikrotik should just fix routeros so that simple attacks like this don't cause reboots

    • @RB01-lite
      @RB01-lite Год назад +4

      This type of an attack can cause a reboot in devices by other manufacturers too. The only reason that it is possible to do this is that the compromised device is in a trusted network with neighbor discovery enabled.

    • @boumarc
      @boumarc Год назад

      @@RB01-lite the fact that other manufacturers have buggy or fragile software too isn't a valid argument for not fixing the bugs / weaknesses leading to such an easy denial of service attack

    • @mikrotik
      @mikrotik  Год назад +5

      Disabling firewall is not "denial of service", it is bad configuration

  • @mohammadforhad2473
    @mohammadforhad2473 Год назад

    Thanks