The BGP Router Masquerading attack.
First of all, the hacker must intercept BGP packets to determine the necessary parameters for configuring the fake router. If Quagga is used, the configuration file is called bgpd.conf.sample and is located in the /etc/quagga/samples directory. The configuration of a fake router is determined by the goals and objectives that the attacker sets for himself. For example, priority routes, network masks, preferred route weights, information about autonomous systems, and so on should be specified.
Besides Quagga, there are many free and open source solutions for working with BGPv4. They can be used to deploy a fake router. Similar programs can be found on
the official website.
Then you need to disable the target BGP router using the attacks described in the book. Next, you need to run a fake router, for example, using the bgpd -d command. As a result, an attacker will be able to "poison" the routing tables used in BGP. However, do not forget that many legal routes will become inaccessible. All this must be taken into account when building an attack.
Oleg Petukhov, lawyer in the field of international law and personal data protection, information security specialist security, protection of information and personal data.
Telegram channel: https://t.me/protectioninformation
Telegram Group: https://t.me/informationprotection1
Website: https://legascom.ru
Email: online@legascom.ru
#informationprotection #informationsecurity




