CYBER SECURITY (Penetration Testing Prerequisites) 1.6 Routing

CYBER SECURITY (Penetration Testing Prerequisites) 1.6 Routing

An undertanding of routing protocol is very important to understand the attacks, perform network traffic inspection.

Routers are the devices connected to the different networks at the same time, they are able to forward IP datagrams from one network to another.

images.jpeg

most of us have our own router at home to provide us with the internet, routers can be the gate of the internet world, also routing protocols are used to determine the best path to reach the network, the behave like a postman who tries to use the shortest path to deliver a letter.

A router inspects the destination address of every incoming packet and then forwards it through one of its interfaces .

507x284xScreenshot_538.png.pagespeed.ic.0XOV_Jyt-d.png

Understanding how the router works are very important to the pentester because it will make it easier for him to analyze the network.

Routing Table:

To choose the right forwarding interface, a router performs a lookup in the routing table, where finds an IP to interface binding.

the table can also contain an entry with the default address (0.0.0.0). the entry is used when the router receives a packet whose destination is unknown.

How to check the routing table :

the routing table are not only keep in the routers, every host stores its own table, you can check them by using the following commands :

IP route

on Linux

Snip20220228_1.png

route print

on windows

Snip20220228_2.png

netstat -r

on OSX

Snip20220228_3.png

In the next article, I will write about link Device protocols.

Written by : Mohamed Abdalla Ibrahim

PMP | CISM | ITIL | CEH | Azure Architect | Azure Security Engineer | IBM Cybersecurity Analyst In the next article, I will write about link Device protocols.

Written by : Mohamed Abdalla Ibrahim

PMP | CISM | ITIL | CEH | Azure Architect | Azure Security Engineer | IBM Cybersecurity Analyst