Downgrade of the RIP protocol.
Oleg Petukhov, lawyer in the field of international law and personal data protection, information security specialist security, protection of information and personal data.
Telegram channel: https://t.me/protectioninformation
Telegram Group: https://t.me/informationprotection1
Website: https://legascom.ru
Email: online@legascom.ru
#informationprotection #informationsecurity
When using the RIP version 1 protocol, authentication is not used and protection is provided only through access lists. Access lists can be bypassed by faking the source IP address. Next, the attacker needs to force the router to use RIP version 1. This can be done using a packet generator, such as nemesis.:
root@kali : # nemesis rip -v -c 1 -V 1 -S 192.168.66.102 -D 192.168.66.202
c2611# 340408: 8w6d: RIP: ignored v1 packet from 192.168.66.102 (illegal version)
It is worth noting that this method does not work on modern Cisco routers running the iOS operating system.




