Network Basics
Network Basics
NETWORK
BASICS FOR
PENETRATION
TESTERS
DRAFT BY
SYED IRFAAN
@follow on Linkedin
Phase 1: Understanding Network Models
1.OSI MODEL
2.TCP/IP Model
2.Switches
Function: Connect devices within the same network.
Types: Managed (configurable) vs. unmanaged (plug-
and-play).
VLANs: Learn about Virtual Local Area Networks for
network segmentation.
3.Firewalls
Function: Control incoming and outgoing traffic based
on predefined rules.
Types: Packet filtering, stateful inspection, and
application-layer firewalls.
4.Access Points
Function: Allow wireless devices to connect to wired
networks.
Security: Understand WPA/WPA2/WPA3 encryption
methods.
5.Modems
Function: Convert digital signals to analog for
transmission over telephone lines.
Types: DSL, cable, and fiber modems.
Phase 3: IP Addressing
1.IPv4 Addressing
Format: Four octets (e.g., 192.168.1.1).
Classes: Understand Class A, B, C, D,
and E addresses and their uses.
2.IPv6 Addressing
Format: Eight groups of hexadecimal
digits (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7
334).
Benefits: Increased address space and
improved routing.
3.Subnetting
Concept: Dividing a network into
smaller sub-networks.
CIDR Notation: Understand how to
calculate subnets (e.g., /24 means
255.255.255.0).
Phase 4: Protocols
1.TCP
Characteristics: Connection-oriented,
reliable, ensures data integrity
through checksums.
Three-way handshake: SYN, SYN-
ACK, ACK process to establish a
connection.
2.UDP
Characteristics: Connectionless,
faster, but no guarantee of delivery or
order.
Used for applications where speed is
critical (e.g., gaming, streaming).
2.Bus Topology
All devices share a single communication
line.
Disadvantages: If the main cable fails, the
entire network goes down.
3.Ring Topology
Devices connected in a circular format;
data travels in one direction.
Disadvantages: A single point of failure
can disrupt the whole network.
4.Mesh Topology
Devices interconnected; multiple
pathways for data.
Advantages: Highly reliable; if one link
fails, data can take another route.
Phase 6: Common Security Concepts
1.Encryption
Protects data by converting it into
a secure format.
Important for securing sensitive
data in transit (e.g., SSL/TLS for
HTTPS).
2.VPN
A secure, encrypted connection
over the internet, allowing remote
access to a private network.
3.NAT
Allows multiple devices on a local
network to share a single public
IP address, adding a layer of
security.
Phase 7: Network Scanning and Enumeration
1.Common Vulnerabilities
Familiarize yourself with vulnerabilities
such as SQL injection, cross-site
scripting (XSS), and buffer overflows.
2.Scanning Tools
Nmap, Nessus, OpenVAS: For
identifying vulnerabilities in networks
and applications.
1.Man-in-the-Middle (MitM)
Attacker intercepts communication
between two parties.
Techniques: ARP spoofing, session
hijacking.
3.Spoofing
Impersonating a trusted entity to
gain unauthorized access.
--Thank You--
Feel free to reach out if you have
any questions or need guidance.
Let’s secure the digital world
together! 💪
@follow on Linkedin