Beruflich Dokumente
Kultur Dokumente
1
Cyberops Infosec
NETWORKING FUNDAMENTALS
Session Flow
• IPv4/IPv5/IPv6
• Calculate Subnetting
• IPv4 Class Divisions
• Services, Ports & Protocols
• Connection Mechanism (TCP V/s UDP)
• NetCat – A Swiss Army Knife
• Domain Name System
• Working of DNS
• Dynamic Domain Name System
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Default
Class Leading bits Start End
subnet mask
Class D
1110 224.0.0.0 239.255.255.255 not defined
(multicast)
Cyberops Infosec
NETWORKING FUNDAMENTALS
Classification of Subnetting
Octets
• The 32-bit IP address is broken up into 4 octets, which are arranged into a dotted-decimal
notation scheme.
• An octet is a set of 8 bits & not a musical instrument.
• Example of an IP version 4:
172.64.126.52
Cyberops Infosec
NETWORKING FUNDAMENTALS
Classification of Subnetting
• Using the ranges, you can determine the class of an address from its 1st octet value.
• An address beginning with 120 is a Class A address, 155 is a Class B address & 220 is a Class
C address.
Cyberops Infosec
NETWORKING FUNDAMENTALS
Classification of Subnetting
The 32 bits of the IP address are divided into Network & Host portions, with the octets assigned
as a part of one or the other.
Cyberops Infosec
NETWORKING FUNDAMENTALS
Classification of Subnetting
• Each Network is assigned a network address & every device or interface (such as a router
port) on the network is assigned a host address.
• There are only 2 specific rules that govern the value of the address.
• A host address cannot be designated by all zeros or all ones.
• These are special addresses that are reserved for special purposes.
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Port 21
Port 25
Port 80
Port 443
Cyberops Infosec
NETWORKING FUNDAMENTALS
• Well Known Ports (0-1023): used by system processes that provide widely used
types of network services.
• Registered Ports (1024-49151): for specific service upon application by a requesting
entity
• Dynamic Ports (49152-65535): This range is used for private, or customized services
or temporary purposes and for automatic allocation of ephemeral ports
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
User 1 User 2
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
• There are many fields but specifically some fields are important to know:
• Source Port: Port number of the sender, on which receiver will respond/connect if
connection goes successful.
Cyberops Infosec
NETWORKING FUNDAMENTALS
• The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to
configure network devices so that they can communicate on an IP network.
• DHCP consists of two components: a protocol for delivering host-specific configuration
parameters from a server to a host and a mechanism for allocation of network addresses to
hosts.
Cyberops Infosec
NETWORKING FUNDAMENTALS
IP Address Allocation
• DHCP supports three mechanisms for IP address allocation.
• Automatic allocation -- in which a permanent IP address is assigned to the client.
• Dynamic allocation -- in which the address is assigned for a limited period of time (a
"lease").
• Manual allocation -- in which the address is assigned manually by the network
administrator.
Cyberops Infosec
NETWORKING FUNDAMENTALS
::Demonstration(Windows)::
Cyberops Infosec
NETWORKING FUNDAMENTALS
::Demonstration(Linux)::
Cyberops Infosec
NETWORKING FUNDAMENTALS
• It is a computer networking utility for reading from and writing to network connections
using TCP or UDP.
• Lets do some practical with our previous knowledge about IP Address, Port number,
TCP/UDP connections and all.
Cyberops Infosec
NETWORKING FUNDAMENTALS
• Downloading Netcat
• Installing in Windows
• Basic Windows Commands like (cd, cp, dir etc)
• Working with Netcat
• Getting Help
• Chat Server
• File Transfer
• Getting Shell/CMD access
Cyberops Infosec
NETWORKING FUNDAMENTALS
• Domain Name: A collection of strings which serve to identify Internet resources, such as
computers, networks, and services.
E.g.
cyberops.in
microsoft.com
google.com
• Subdomain: Subdomain names are Web addresses created by adding a third-level domain
to your existing domain name.
E.g.
Images.google.com
mail.example.com
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Cyberops Infosec
NETWORKING FUNDAMENTALS
Demonstration :
Cyberops Infosec