Attacking Routing Protocols
In the previous chapter, we learned about wireless encryption protocols, wireless architecture, attacks on wireless networks, and securing wireless networks. This chapter talks about different but very interesting and important network protocols: routing protocols, especially the Interior Gateway Protocol (IGP).
IGP is used to share the routing information in the form of a routing table within the autonomous system to route traffic and network protocols such as Internet Protocol (IP).
This chapter starts with an explanation of the IGP protocol, various routing protocols, misconfigurations, and the countermeasures that can be implemented to secure the routing protocol from various attacks.
In this chapter, we will cover the following topics:
- IGP standard protocols – the behaviors of RIP (brief), OSFP, and IS-IS
- Falsification, overclaiming, and disclaiming
- DDOS, mistreating, and attacks on the control plane
- Routing table...