OSPF uses 89 protocol types, so you can use nmap protocol scanning to determine OSPF, unless the network does not respond to these types of queries by configuring the access list. As follows:
Root @ test] # nmap-sO-router.ip.address.252
Interestingprotocolson (router. ip. address.252 ):
ProtocolStateName
89 openospfigp
OSPF is much safer than RIP because it has several built-in security mechanisms. However, several components of LSA can be modified by capturing and re-injecting OSPF information packets, the JiNao team developed a LINUX implementation of FREEBSDdivertsocket and used it in their tests.
OSPF can be configured with no authentication mechanism, plaintext password authentication, or MD5, so that attackers can obtain a certain degree of access, for example, they can use tools such as dsniff to monitor OSPF packets and plaintext passwords. Attackers can run divertsocket or other possible types of ARP spoofing tools to redirect communication.