Mapping of external network layers through TCP/IP protocols vulnerability
To map the second layer of the network, we must use the vulnerability of internal routing protocols to know what systems are served inside a router, these vulnerabilities can be specified for the RIP protocol on port 520 and for OSPF on port 89 and only It is enough to create a program to interact with these protocols using its client, the details of which are available in the SCAPY library, as well as another protocol for mapping and sending datagrams outside the network, such as ICMP and ARP protocols, which are in the UDP segment. They are used. In the network, we use authentication services to discover hosts under the data link layer, and routing protocols for the network layer, and cryptographic protocols for host authentication for the transmission layer, all of which are included in the above. It can help us in identifying a host or system, and the most important issue is sending datagrams to the selected route and identifying many vulnerabilities that exist, it can help us in identifying the behavior of a system, because for each port, a script for There is bypassing the authentication process; In this article, we examine the set of techniques that lead to the identification of IPs that feed from a router, system or modem. This method can be used in a global network or a NAT.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.