0% found this document useful (0 votes)
14 views11 pages

Network Basics

Network basic from beginning

Uploaded by

vaibh006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views11 pages

Network Basics

Network basic from beginning

Uploaded by

vaibh006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

DESIGNING THE FUTURE

NETWORK
BASICS FOR
PENETRATION
TESTERS

DRAFT BY
SYED IRFAAN
@follow on Linkedin
Phase 1: Understanding Network Models

1.OSI MODEL

Layer 1: Physical: Deals with hardware


connections (cables, switches). Understand
cabling standards (e.g., CAT5, CAT6) and signal
transmission.

Layer 2: Data Link: Responsible for node-to-


node data transfer. Learn about MAC addresses
and protocols like Ethernet.

Layer 3: Network: Manages routing of data. Key


protocols include IP (Internet Protocol) and
ICMP (Internet Control Message Protocol).

Layer 4: Transport: Ensures complete data


transfer. Familiarize yourself with TCP (reliable,
connection-oriented) and UDP (unreliable,
connectionless) protocols.

Layer 5: Session: Manages sessions between


applications (e.g., opening, closing
connections).
Layer 6: Presentation: Translates data
formats (e.g., encryption/decryption).

Layer 7: Application: Interfaces directly with


user applications (e.g., HTTP, FTP).

2.TCP/IP Model

1.Link Layer: Combines OSI’s Physical and


Data Link layers; involves network interfaces
and protocols

2.Internet Layer: Corresponds to OSI's Network


layer; primarily uses IP protocols.

3.Transport Layer: Maps to OSI’s Transport


layer; involves TCP and UDP.

4.Application Layer: Includes all higher-level


protocols, combining OSI's Session,
Presentation, and Application layers.
Phase 2: Networking Devices
1.Routers
Function: Direct traffic between different networks.
Configuration: Understand routing protocols (e.g.,
OSPF, BGP) and NAT (Network Address Translation)
settings.

2.Switches
Function: Connect devices within the same network.
Types: Managed (configurable) vs. unmanaged (plug-
and-play).
VLANs: Learn about Virtual Local Area Networks for
network segmentation.

3.Firewalls
Function: Control incoming and outgoing traffic based
on predefined rules.
Types: Packet filtering, stateful inspection, and
application-layer firewalls.

4.Access Points
Function: Allow wireless devices to connect to wired
networks.
Security: Understand WPA/WPA2/WPA3 encryption
methods.

5.Modems
Function: Convert digital signals to analog for
transmission over telephone lines.
Types: DSL, cable, and fiber modems.
Phase 3: IP Addressing

1.IPv4 Addressing
Format: Four octets (e.g., 192.168.1.1).
Classes: Understand Class A, B, C, D,
and E addresses and their uses.

2.IPv6 Addressing
Format: Eight groups of hexadecimal
digits (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7
334).
Benefits: Increased address space and
improved routing.

3.Subnetting
Concept: Dividing a network into
smaller sub-networks.
CIDR Notation: Understand how to
calculate subnets (e.g., /24 means
255.255.255.0).
Phase 4: Protocols

1.TCP
Characteristics: Connection-oriented,
reliable, ensures data integrity
through checksums.
Three-way handshake: SYN, SYN-
ACK, ACK process to establish a
connection.

2.UDP
Characteristics: Connectionless,
faster, but no guarantee of delivery or
order.
Used for applications where speed is
critical (e.g., gaming, streaming).

3.Application Layer Protocols


HTTP/HTTPS: Web traffic protocols;
HTTPS includes SSL/TLS encryption.
FTP/SFTP: Used for file transfer; SFTP
provides secure file transfer.
Phase 5: Network Topologies
1.Star Topology
All devices connected to a central
hub/switch.
Advantages: Easy to add/remove
devices; if one link fails, others remain
unaffected.

2.Bus Topology
All devices share a single communication
line.
Disadvantages: If the main cable fails, the
entire network goes down.
3.Ring Topology
Devices connected in a circular format;
data travels in one direction.
Disadvantages: A single point of failure
can disrupt the whole network.

4.Mesh Topology
Devices interconnected; multiple
pathways for data.
Advantages: Highly reliable; if one link
fails, data can take another route.
Phase 6: Common Security Concepts

1.Encryption
Protects data by converting it into
a secure format.
Important for securing sensitive
data in transit (e.g., SSL/TLS for
HTTPS).

2.VPN
A secure, encrypted connection
over the internet, allowing remote
access to a private network.

3.NAT
Allows multiple devices on a local
network to share a single public
IP address, adding a layer of
security.
Phase 7: Network Scanning and Enumeration
1.Common Vulnerabilities
Familiarize yourself with vulnerabilities
such as SQL injection, cross-site
scripting (XSS), and buffer overflows.

2.Scanning Tools
Nmap, Nessus, OpenVAS: For
identifying vulnerabilities in networks
and applications.

Phase 9: Wireless Networks


1.Wireless Security Protocols
WEP: Outdated and insecure; avoid
using.
WPA/WPA2: Improved security for
wireless networks; WPA3 is the latest
and most secure.

2.Wireless Assessment Tools


Tools like Aircrack-ng for assessing the
security of wireless networks.
Phase 10: Common Attacks

1.Man-in-the-Middle (MitM)
Attacker intercepts communication
between two parties.
Techniques: ARP spoofing, session
hijacking.

2.Denial of Service (DoS)


Overloading a network service to
make it unavailable.
Understand different types (e.g.,
SYN flood, DDoS).

3.Spoofing
Impersonating a trusted entity to
gain unauthorized access.
--Thank You--
Feel free to reach out if you have
any questions or need guidance.
Let’s secure the digital world
together! 💪
@follow on Linkedin

You might also like