About this ebook
In this book, we're going to discuss network attacks.
There are many different types of threats out there and many of them carry out their attacks over your networks. These attacks include things like denial of service attacks, spoofing, hijacking, replays, transitive attacks, DNS attacks, and ARP poisoning.
Now, before we get into all of those different types
of attacks, it's important for us to do a quick review of the basics of ports and protocols that you learned back in Network+.
After all, the exam is going to focus on particular ports and protocols and how it's best to secure them.
Read more from As Snipes
CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsThreat Actors: Unveiling Cybersecurity Adversaries Rating: 0 out of 5 stars0 ratingsA Deep Dive into Malicious Activities Rating: 0 out of 5 stars0 ratingsCompTIA Security +: Malware and Malware Infections Rating: 0 out of 5 stars0 ratingsSpeak to Anyone Fearlessly Rating: 0 out of 5 stars0 ratingsCompTia 701: Navigating the Risk Management Landscape Rating: 0 out of 5 stars0 ratingsUnderstanding Governance in IT Rating: 0 out of 5 stars0 ratings
Related to CompTIA Security+
Related ebooks
CompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5CEH Certified Ethical Hacker Study Guide Rating: 3 out of 5 stars3/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsThe Hacker Ethos Rating: 5 out of 5 stars5/5Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Networking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-501 Rating: 4 out of 5 stars4/5SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsIT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsWireshark Network Security Rating: 3 out of 5 stars3/5Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Web Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity Blue Team Toolkit Rating: 2 out of 5 stars2/5Microsoft Windows Security Essentials Rating: 5 out of 5 stars5/5CCNA Certification All-in-One For Dummies Rating: 5 out of 5 stars5/5AZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratingsEnterprise Security: A Data-Centric Approach to Securing the Enterprise Rating: 0 out of 5 stars0 ratingsNetwork Attacks and Exploitation: A Framework Rating: 4 out of 5 stars4/5Penetration Testing For Dummies Rating: 0 out of 5 stars0 ratingsHacking Multifactor Authentication Rating: 0 out of 5 stars0 ratingsDesigning and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and l7-filter Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5
Certification Guides For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5CCNA Certification Study Guide Volume 1: Exam 200-301 v1.1 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5CompTIA Network+ Study Guide: Exam N10-009 Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5How to Get Started as a Technical Writer Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Study Guide: Exam Core 1 220-1001 and Exam Core 2 220-1002 Rating: 4 out of 5 stars4/5CISSP Official (ISC)2 Practice Tests Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Study Guide: Exams (Core 1: 220-1101 and Core 2: 220-1102) Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsMicrosoft Office 365 for Business Rating: 4 out of 5 stars4/5AWS Certified Cloud Practitioner: Study Guide with Practice Questions and Labs Rating: 5 out of 5 stars5/5SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsPMP Project Management Professional Exam Study Guide: 2021 Exam Update Rating: 4 out of 5 stars4/5Thinking Beyond Coding Rating: 5 out of 5 stars5/5CompTIA Network+ Study Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Data+ Study Guide: Exam DA0-001 Rating: 0 out of 5 stars0 ratingsCompTIA A+ Certification All-in-One Exam Questions Prep (220-701 & 220-702) Rating: 3 out of 5 stars3/5PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 0 out of 5 stars0 ratings
Reviews for CompTIA Security+
1 rating0 reviews
Book preview
CompTIA Security+ - AS Snipes
Introduction
In this book, we're going to discuss network attacks.
There are many different types of threats out there and many of them carry out their attacks over your networks. These attacks include things like denial of service attacks, spoofing, hijacking, replays, transitive attacks, DNS attacks, and ARP poisoning.
Now, before we get into all of those different types
of attacks, it's important for us to do a quick review of the basics of ports and protocols that you learned back in Network+.
After all, the exam is going to focus on particular ports and protocols and how it's best to secure them. So, let's get started with our review of ports and protocols.
Ports and Protocols
In security, one of the most important things is to ensure that you understand what openings you have created in your systems when it comes to computers and networks. Most of these openings are going to be created by ports.
Now, a port is simply a logical communication endpoint that exists on your computer or your server.
For example, if you're running a Web server, you're going to have Port 80 open and listening for inbound requests from your potential visitors.
Now, ports are classified as either inbound or outbound ports. An import is used when your computer or server is listening for a connection. Just as in my earlier example, the Web server has Port 80 open. That's an inbound port.
It's just waiting for somebody to come along and connect to it.
An outbound port, on the other hand, is open by your computer whenever it wants to connect to a server. If my computer is attempting to make a connection to your Web server over port. Well, then my computer is going to open up a random number port such as Port five, two, three, six, three, and it's going to make an outbound request to that Web server.
In addition to being called inbound and outbound ports, the ports are going to be assigned a number. The number can be anywhere between zero and sixty five thousand five hundred and thirty five. But this big range is actually divided into three smaller groups.
The first group is called the well known ports.
This is for any ports that are between zero and one thousand twenty three. These are called well known ports because they're designated by Ianna,