Create fake Routers with python and scapy

Поделиться
HTML-код
  • Опубликовано: 17 авг 2021
  • It's too easy to create fake routers and inject routes into real routers if they are not configured properly. In this video I show you how to create fake EIGRP neighbors. In other videos I show you how to add fake EIGRP routes to Cisco routers and how to DoS a network using Python.
    You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good.
    Learn to code. Learn Linux. Learn Networking.
    ======
    Scripts:
    ======
    One EIGRP fake neighbor: davidbombal.wiki/oneeigrpfake...
    Many EIGRP fake neighbors: davidbombal.wiki/eigrpfakenei...
    Playlist: davidbombal.wiki/scapy
    ==============
    Scapy Resources:
    ==============
    Website: scapy.net/
    Documentation: scapy.readthedocs.io/en/latest/
    Scapy installation:
    ===============
    sudo apt update
    sudo apt install python3-pip
    sudo pip3 install scapy
    ================
    Connect with me:
    ================
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    RUclips: / davidbombal
    python
    scapy
    ccna
    eigrp
    routing
    cisco routers
    fake cisco routers
    fake router
    fake routers in network
    fake routes
    route injection
    python scapy
    ccna 200-301
    python scripts
    kali linux
    linux
    kali
    kali linux 2021.2
    kali linux 2021
    oscp
    ceh
    security+
    pentest+
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    #hacking #python #scapy
  • НаукаНаука

Комментарии • 113

  • @davidbombal
    @davidbombal  3 года назад +20

    It's too easy to create fake routers and inject routes into real routers if they are not configured properly. In this video I show you how to create fake EIGRP neighbors. In other videos I show you how to add fake EIGRP routes to Cisco routers and how to DoS a network using Python.
    You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good.
    Learn to code. Learn Linux. Learn Networking.
    ======
    Scripts:
    ======
    One EIGRP fake neighbor: davidbombal.wiki/oneeigrpfakeneighbor
    Many EIGRP fake neighbors: davidbombal.wiki/eigrpfakeneighbors
    Playlist: davidbombal.wiki/scapy
    ==============
    Scapy Resources:
    ==============
    Website: scapy.net/
    Documentation: scapy.readthedocs.io/en/latest/
    Scapy installation:
    ===============
    sudo apt update
    sudo apt install python3-pip
    sudo pip3 install scapy
    ================
    Connect with me:
    ================
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    python
    scapy
    ccna
    eigrp
    routing
    cisco routers
    fake cisco routers
    fake router
    fake routers in network
    fake routes
    route injection
    python scapy
    ccna 200-301
    python scripts
    kali linux
    linux
    kali
    kali linux 2021.2
    kali linux 2021
    oscp
    ceh
    security+
    pentest+
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

  • @idhantsood1105
    @idhantsood1105 3 года назад +5

    Great video, I checked out your super old videos like 13 years old and I noticed that from always you were consistent with videos and had top-class videos. Thankyou

    • @davidbombal
      @davidbombal  3 года назад +2

      Thank you! I appreciate it 😀

  • @wyattarich
    @wyattarich 3 года назад +9

    You can also use an EOF (end of field) to exit things, including the Python interpreter. This is inserted with a CTRL+D. Thanks for another high-quality upload.

  • @nicholassattaur9964
    @nicholassattaur9964 3 года назад

    You're the best teacher and networking expert I've come across! Thanks David for sharing

  • @abdallamohamed5844
    @abdallamohamed5844 3 года назад +6

    So big, so potential and so Bombal so far ❤️

  • @scottym50
    @scottym50 3 года назад

    I can really say that I wouldn't know what to do without you.
    You are the best.
    Thank you so very much.

  • @techmidas
    @techmidas 3 года назад

    Interesting stuff. What do you think about probably adding a few mitigation tips at the end of these sort of vids? Apologies if you do but this is the 1st I've seen from you on this sort of stuff. Thanks David!

  • @hanomedia
    @hanomedia 3 года назад +1

    *Thanks for another educative video, i learnt a lot from you*

  • @educastellini
    @educastellini 3 года назад

    -Great Content professor David....!!!
    -Thank you for the knowledge...!!!

  • @krishnasharma5843
    @krishnasharma5843 3 года назад

    Excellent work SIR....👏👏👏👏

  • @aymanad446
    @aymanad446 2 года назад

    thanks for everything David Bombal

  • @amirmohamed8748
    @amirmohamed8748 3 года назад +1

    Thank you very much because you are sharing your knowledge with us . This is a great trait . Thanks again .

  • @vyasG
    @vyasG 3 года назад +1

    Thank you for this informative video. Suggestion: It would be very useful if at the end of these videos, you mention the best practices to be followed to prevent the hack.
    Edit: I saw your previous video "Hacking Routers with Python // Fake route injection to BLACK HOLE networks", in which you have mentioned how to prevent this kind of hack. Should have watched in order.

  • @kermitdaphrogge525
    @kermitdaphrogge525 3 года назад +6

    Sir, can you demonstrate your attacks on "HackTheBox" machines?

  • @rasheednazar755
    @rasheednazar755 3 месяца назад

    Hi David. I am a huge fan of your videos. Would love to see OSPFv2 using scapy in action as well just like you did for EIGRP. Thanks!

  • @papealiouneniasse4842
    @papealiouneniasse4842 3 года назад

    Too many knowlegde thank you Sr Bombal

  • @manasrai6627
    @manasrai6627 3 года назад

    Thanks for the information sir.!

  • @ashishashish-di3cg
    @ashishashish-di3cg 3 года назад +1

    Please upload more
    videos on this topic 👍👍

  • @Konchevski9
    @Konchevski9 3 года назад +1

    Keep up the good work David❤️

  • @dineshjeyabal7873
    @dineshjeyabal7873 3 года назад

    It's marvellous DAVID..

  • @dotsecurity22
    @dotsecurity22 3 года назад +9

    Who love David Bombal 👉👉👉👉👉

  • @Firoz900
    @Firoz900 3 года назад

    Thank you David.

  • @rohithj.e9254
    @rohithj.e9254 3 года назад

    Hello sir , thanks for sharing your wise knowledge

  • @curseyyyff
    @curseyyyff 3 года назад

    Thanks Sir For Everything ❤

  • @sofoniyasisacisacnifos3498
    @sofoniyasisacisacnifos3498 3 года назад

    God bless u men God send u for us who can't afford to learn at school

  • @5skr0ll3r3
    @5skr0ll3r3 Год назад

    what kind of environment are you using ? (lab setup for the routers and ubuntu container) (or are they physical? is there any software or a site)

  • @omarmukhtar5848
    @omarmukhtar5848 2 года назад +1

    hello David , its nice to watch your videos but I'm facing some problems to apply the fake route injection attack, it dosen't work on GNS3 or EVE-ng , could you please explain to me why it dosen't work ?

  • @vj-595
    @vj-595 3 года назад

    Hi sir, I've started following your channel recently. I've installed kali linux on a seperate pc, where do I start in your videos to know the basic tools and use them. Thanks in advance

  • @Nwo-jo3oe
    @Nwo-jo3oe 3 года назад

    Cyber Genius in action!

  • @justinboss4131
    @justinboss4131 2 года назад

    Hello David
    thanks for this awesome video. I was just having a discussion with my colleague who was configuring "no passive interface" on an interface connected to a provider. basically sending our internal Eigrp updates their way. I realize now this kind of misconfigurations happen alot. Can you explain what this line of code in your python script did "192.168.122.%s" % (i)..... I don't understand what you did with that last octet and what the modulo result with (i) will produce ??

  • @lepriconi0
    @lepriconi0 2 года назад

    are you tried on the latest ios version? or it doesn't matter what version you are running on. could this be also applicable to asr?

  • @TANKBM
    @TANKBM 3 года назад +1

    Professor David, do you know what they call you in the Arab world? They call you the network dragon. We love your videos and learn from them. We even made groups for your lessons 👍👍

  • @india_as_bharat
    @india_as_bharat 3 года назад

    Thanks David !💖💖💖💖💖💖💖💖💖💖
    Love from INDIA 💝💝💝💝💝💝💝💝💝

  • @bug_artist4736
    @bug_artist4736 3 года назад

    Sir very usefull thank you sir

  • @antonioinochi9170
    @antonioinochi9170 2 года назад

    Thanks very interesting video!
    One question, is there a way to change the mac address of a modem router permanently or not?
    Thanks again..all the best

  • @stark6314
    @stark6314 3 года назад

    😋 That's Informative David!

  • @rokeyashahidrina5075
    @rokeyashahidrina5075 3 года назад +1

    খুবই সুন্দর ভিডিও 💖💖

  • @natrajexplore
    @natrajexplore 3 года назад

    Which simulation is best for hack test Mr. Bombal

  • @siddshrestha7780
    @siddshrestha7780 3 года назад

    Wonderful video

  • @TylerRake141
    @TylerRake141 3 года назад

    I studied about Eigrp but didn't know we could do something like this with it haha. Very informative video, David!

    • @davidbombal
      @davidbombal  3 года назад

      Glad you enjoyed the video Aftab!

  • @anonymoushacker2860
    @anonymoushacker2860 3 года назад

    WE LOVE TO LEARN WITH YOU SIR
    LOVE FROM INDIA JAI HIND

  • @gardensindeze2568
    @gardensindeze2568 3 года назад

    hi david thank you for this effort

  • @gjsatru3383
    @gjsatru3383 3 года назад

    Why does it happens david that whenever I see your video I cannot stop myself to see it till the end and put a like 🤔

  • @HarrySingh-ig9ui
    @HarrySingh-ig9ui 3 года назад

    Great Video!

  • @ibrahimabdeltawab6418
    @ibrahimabdeltawab6418 3 года назад

    Thanks so much ❤️

    • @davidbombal
      @davidbombal  3 года назад +1

      You’re welcome Ibrahim 😊

  • @war-c0mmander
    @war-c0mmander 3 года назад

    Thank you :)

  • @coding_rythm7213
    @coding_rythm7213 3 года назад

    hello sir
    can you tell how a game shop is know that a how many draw is need for a particular item in the game shop
    and which algorithm they use

  • @edoardomaccione
    @edoardomaccione 3 года назад

    Can you do an episode about VLAN hopping? I think it would be very interesting

  • @ahmedalobaidy1
    @ahmedalobaidy1 2 года назад

    Hi can we use same way to craft OSPF

  • @ashwanth2018
    @ashwanth2018 3 года назад

    Hey David kindly provide some content on Software Defined Network (SDN) basics

  • @realhomy
    @realhomy 3 года назад +1

    Thanks

  • @oscarsalgado189
    @oscarsalgado189 2 года назад

    what about ospf??' i did alomost the same but its not working

  • @nagaprasadvr2893
    @nagaprasadvr2893 3 года назад

    Hey david looking forward to metasploit contents

  • @Maica1V
    @Maica1V 2 года назад

    Nice content

  • @prethiviv.s5141
    @prethiviv.s5141 3 года назад

    Where did you learnt this. Institute or your own ?

  • @diwakar_tsn
    @diwakar_tsn 3 года назад

    Thanks sir ☺️ 🤘 😇 😇 🥰 🥰 🥰, ❤️❤️

  • @Lord_Abreu
    @Lord_Abreu 3 года назад

    Hey David show us something relate to RPKI with scapy please =D

  • @Hartley94
    @Hartley94 3 года назад

    Thank you.

  • @ASecurityPro
    @ASecurityPro 2 года назад

    why you don't show in the end of video the remediation and prevention method for the attack.

  • @joerockhead7246
    @joerockhead7246 3 года назад +1

    More evil than last time. Thanks, David.

  • @theconfusedhamster
    @theconfusedhamster 3 года назад

    I am Your Big Fan

  • @JudgeGideon823
    @JudgeGideon823 3 года назад

    You are the Bomb-al

  • @narcseven4213
    @narcseven4213 2 года назад +1

    And can you explain in the beginning why would I create a fake router?

  • @mohamedchekhab276
    @mohamedchekhab276 3 года назад

    Hi David , please make a complete course about ethical hacking using python , and thanks 🥀

  • @adithyaroy6805
    @adithyaroy6805 3 года назад

    i love your videos, sir

  • @adriansoto6897
    @adriansoto6897 3 года назад

    Could one of the solutions be to enable ports as passive-interface to avoid this problem with hackers?

  • @ApteraEV2024
    @ApteraEV2024 2 года назад

    Won't you be my Neighbor))) sorry... Thanks for sharing))

  • @theconfusedhamster
    @theconfusedhamster 3 года назад

    Big Fan Sir

  • @learn2hack873
    @learn2hack873 3 года назад +1

    👌👌👌👌

  • @Kennethlumor
    @Kennethlumor 3 года назад

    SIR PLEASE I WANT TO ASK CAN YOU LEARN PACKET TRACER AND AND USE THE SAME KNOWLEDGE TO DO NETWORKING.. PLEASE

  • @crust72
    @crust72 2 года назад

    I have not met such networks in which users are located in the same vlan as the routed interfaces of routers.
    But let's write off the default settings and curves of the admin's hands.
    EIGRP authentication will not help in this case (tested) so the only thing left
    is to avoid multicast traffic, that is, a certain list of neighbors in the EIGRP
    configuration.
    router eigrp AS
    neighbor ip_address interface
    in this case, the attacker will not see the packet he is trying to intercept.

    • @davidbombal
      @davidbombal  2 года назад +1

      Watch the next video in the series here: ruclips.net/video/Cr43jXsERQU/видео.html

  • @cronojob8502
    @cronojob8502 3 года назад

    Buffer exploit next video please

  • @fadhilsaheer8877
    @fadhilsaheer8877 3 года назад +6

    If the internet go down, I need this man alive he is a god of knowledge 💗

    • @davidbombal
      @davidbombal  3 года назад +3

      lol... thank you! But I am just a normal guy 😀

    • @sayedsekandar
      @sayedsekandar 3 года назад +3

      @@davidbombal Sir has a pure heart. That's why he shares his knowledge. Cause there are many people who never shares their knowledge. We are lucky to have him as our mentor.

    • @muhammadameen4674
      @muhammadameen4674 3 года назад

      @@sayedsekandar Absolutely right

  • @johnnymann14
    @johnnymann14 3 года назад

    Does anyone have learning sources for scapy

    • @davidbombal
      @davidbombal  3 года назад

      Check the video description for links to the documentation. I'll create a getting started with scapy video because a lot of people have asked for a basic starting guide.

    • @johnnymann14
      @johnnymann14 3 года назад

      @David Bombal thanks for helping me and letting me know

  • @ethicalhackingandciscotech9361
    @ethicalhackingandciscotech9361 3 года назад

    💪💪💪

  • @TEAM4o4
    @TEAM4o4 3 года назад

    😍😍😍

  • @oy9804
    @oy9804 3 года назад

    cool ❤️

  • @MersadMolaei
    @MersadMolaei 3 года назад

    👌❤

  • @KaivalyaGurav
    @KaivalyaGurav 3 года назад

    ❤️❤️❤️❤️

  • @saisandeepgurram8889
    @saisandeepgurram8889 3 года назад

    David sir, Can we hack wifi without adding rocktou.txt files,worldlists or passwords lists any tools can we have without adding password fiels or txt file can you tell me how to download those tools and with those tools how can we hack wifi. can please help us.

  • @forheuristiclifeksh7836
    @forheuristiclifeksh7836 4 месяца назад

    0:14 EIGRP

  • @Voraurdaddy
    @Voraurdaddy 3 года назад

    Okay

  • @a_falcongaming2749
    @a_falcongaming2749 3 года назад

    Beat teacher dose not go to fast or slow 😙😙😙😙😙😙😙😙😙😙😙😙😙😙😙😙😗😗😗😗😙😙😗😚😙😚😙

  • @anonymoushacker2860
    @anonymoushacker2860 3 года назад

    225 like

  • @manishkumarmahato2481
    @manishkumarmahato2481 3 года назад

    Linux

  • @Error-jz2rr
    @Error-jz2rr 3 года назад

    I'm not first 😑

  • @ubaidsahil2966
    @ubaidsahil2966 3 года назад

    I want to learn hacking who can help me