CYBER SECURITY (Penetration Testing Prerequisites) 1.6 Routing

Welcome to my blog! My name is Mohamed Abdalla Ibrahim and I am a Cyber Security Specialist and IS security enthusiast. With over 15 years of experience in an enterprise environment, I have a strong understanding of the business risks related to IT. I am always seeking out the newest technologies to upgrade my knowledge and enhance my skills and qualifications in my field. I am self-motivated and have strong communication skills, and my greatest goal is to be a distinguished source of innovation in the IT field. Thank you for visiting my blog, and I hope you find the information and resources on this site helpful and informative
An undertanding of routing protocol is very important to understand the attacks, perform network traffic inspection.
Routers are the devices connected to the different networks at the same time, they are able to forward IP datagrams from one network to another.

most of us have our own router at home to provide us with the internet, routers can be the gate of the internet world, also routing protocols are used to determine the best path to reach the network, the behave like a postman who tries to use the shortest path to deliver a letter.
A router inspects the destination address of every incoming packet and then forwards it through one of its interfaces .

Understanding how the router works are very important to the pentester because it will make it easier for him to analyze the network.
Routing Table:
To choose the right forwarding interface, a router performs a lookup in the routing table, where finds an IP to interface binding.
the table can also contain an entry with the default address (0.0.0.0). the entry is used when the router receives a packet whose destination is unknown.
How to check the routing table :
the routing table are not only keep in the routers, every host stores its own table, you can check them by using the following commands :
IP route
on Linux

route print
on windows

netstat -r
on OSX

In the next article, I will write about link Device protocols.
Written by : Mohamed Abdalla Ibrahim
PMP | CISM | ITIL | CEH | Azure Architect | Azure Security Engineer | IBM Cybersecurity Analyst In the next article, I will write about link Device protocols.
Written by : Mohamed Abdalla Ibrahim
PMP | CISM | ITIL | CEH | Azure Architect | Azure Security Engineer | IBM Cybersecurity Analyst






