About this ebook
In this book, we're going to discuss network attacks.
There are many different types of threats out there and many of them carry out their attacks over your networks. These attacks include things like denial of service attacks, spoofing, hijacking, replays, transitive attacks, DNS attacks, and ARP poisoning.
Now, before we get into all of those different types
of attacks, it's important for us to do a quick review of the basics of ports and protocols that you learned back in Network+.
After all, the exam is going to focus on particular ports and protocols and how it's best to secure them.
Read more from As Snipes
CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsThreat Actors: Unveiling Cybersecurity Adversaries Rating: 0 out of 5 stars0 ratingsCompTIA Security +: Malware and Malware Infections Rating: 0 out of 5 stars0 ratingsA Deep Dive into Malicious Activities Rating: 0 out of 5 stars0 ratingsCompTia 701: Navigating the Risk Management Landscape Rating: 0 out of 5 stars0 ratingsSpeak to Anyone Fearlessly Rating: 0 out of 5 stars0 ratingsUnderstanding Governance in IT Rating: 0 out of 5 stars0 ratings
Related to CompTIA Security+
Related ebooks
CompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5CEH Certified Ethical Hacker Study Guide Rating: 3 out of 5 stars3/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsLearn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsPenetration Testing For Dummies Rating: 0 out of 5 stars0 ratingsIT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and l7-filter Rating: 0 out of 5 stars0 ratingsCyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsWireshark Network Security Rating: 3 out of 5 stars3/5AZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-501 Rating: 4 out of 5 stars4/5Ultimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsSSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Security Essentials Rating: 5 out of 5 stars5/5Cybersecurity Blue Team Toolkit Rating: 2 out of 5 stars2/5Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Blind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Zero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-001 Rating: 0 out of 5 stars0 ratingsComptia+ Network Rating: 0 out of 5 stars0 ratingsCISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsComptia Network+ Primer Rating: 0 out of 5 stars0 ratings(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests Rating: 0 out of 5 stars0 ratingsCompTIA A+ Certification Rating: 2 out of 5 stars2/5Comptia Security+ Primer Rating: 5 out of 5 stars5/5Comptia Network+ V6 Study Guide - Indie Copy Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-003 Rating: 1 out of 5 stars1/5
Certification Guides For You
Coding For Dummies Rating: 5 out of 5 stars5/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA A+ Certification Passport, Seventh Edition (Exams 220-1001 & 220-1002) Rating: 2 out of 5 stars2/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Thinking Beyond Coding Rating: 5 out of 5 stars5/5CompTIA A+ Complete Study Guide: Exam Core 1 220-1001 and Exam Core 2 220-1002 Rating: 4 out of 5 stars4/5The Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsCCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 5 out of 5 stars5/5Microsoft Office 365 for Business Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5PMP Project Management Professional Exam Study Guide: 2021 Exam Update Rating: 4 out of 5 stars4/5CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Study Guide: Exam N10-009 Rating: 0 out of 5 stars0 ratingsCompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA PenTest+ Study Guide: Exam PT0-002 Rating: 0 out of 5 stars0 ratingsSSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsMicrosoft Certified Azure Fundamentals Study Guide: Exam AZ-900 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Study Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Get Started as a Technical Writer Rating: 4 out of 5 stars4/5CISSP Official (ISC)2 Practice Tests Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner: Study Guide with Practice Questions and Labs Rating: 5 out of 5 stars5/5
Reviews for CompTIA Security+
1 rating0 reviews
Book preview
CompTIA Security+ - AS Snipes
Introduction
In this book, we're going to discuss network attacks.
There are many different types of threats out there and many of them carry out their attacks over your networks. These attacks include things like denial of service attacks, spoofing, hijacking, replays, transitive attacks, DNS attacks, and ARP poisoning.
Now, before we get into all of those different types
of attacks, it's important for us to do a quick review of the basics of ports and protocols that you learned back in Network+.
After all, the exam is going to focus on particular ports and protocols and how it's best to secure them. So, let's get started with our review of ports and protocols.
Ports and Protocols
In security, one of the most important things is to ensure that you understand what openings you have created in your systems when it comes to computers and networks. Most of these openings are going to be created by ports.
Now, a port is simply a logical communication endpoint that exists on your computer or your server.
For example, if you're running a Web server, you're going to have Port 80 open and listening for inbound requests from your potential visitors.
Now, ports are classified as either inbound or outbound ports. An import is used when your computer or server is listening for a connection. Just as in my earlier example, the Web server has Port 80 open. That's an inbound port.
It's just waiting for somebody to come along and connect to it.
An outbound port, on the other hand, is open by your computer whenever it wants to connect to a server. If my computer is attempting to make a connection to your Web server over port. Well, then my computer is going to open up a random number port such as Port five, two, three, six, three, and it's going to make an outbound request to that Web server.
In addition to being called inbound and outbound ports, the ports are going to be assigned a number. The number can be anywhere between zero and sixty five thousand five hundred and thirty five. But this big range is actually divided into three smaller groups.
The first group is called the well known ports.
This is for any ports that are between zero and one thousand twenty three. These are called well known ports because they're designated by Ianna,