0% found this document useful (0 votes)
7 views

Network Basics

Network basic from beginning

Uploaded by

vaibh006
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Network Basics

Network basic from beginning

Uploaded by

vaibh006
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

DESIGNING THE FUTURE

NETWORK
BASICS FOR
PENETRATION
TESTERS

DRAFT BY
SYED IRFAAN
@follow on Linkedin
Phase 1: Understanding Network Models

1.OSI MODEL

Layer 1: Physical: Deals with hardware


connections (cables, switches). Understand
cabling standards (e.g., CAT5, CAT6) and signal
transmission.

Layer 2: Data Link: Responsible for node-to-


node data transfer. Learn about MAC addresses
and protocols like Ethernet.

Layer 3: Network: Manages routing of data. Key


protocols include IP (Internet Protocol) and
ICMP (Internet Control Message Protocol).

Layer 4: Transport: Ensures complete data


transfer. Familiarize yourself with TCP (reliable,
connection-oriented) and UDP (unreliable,
connectionless) protocols.

Layer 5: Session: Manages sessions between


applications (e.g., opening, closing
connections).
Layer 6: Presentation: Translates data
formats (e.g., encryption/decryption).

Layer 7: Application: Interfaces directly with


user applications (e.g., HTTP, FTP).

2.TCP/IP Model

1.Link Layer: Combines OSI’s Physical and


Data Link layers; involves network interfaces
and protocols

2.Internet Layer: Corresponds to OSI's Network


layer; primarily uses IP protocols.

3.Transport Layer: Maps to OSI’s Transport


layer; involves TCP and UDP.

4.Application Layer: Includes all higher-level


protocols, combining OSI's Session,
Presentation, and Application layers.
Phase 2: Networking Devices
1.Routers
Function: Direct traffic between different networks.
Configuration: Understand routing protocols (e.g.,
OSPF, BGP) and NAT (Network Address Translation)
settings.

2.Switches
Function: Connect devices within the same network.
Types: Managed (configurable) vs. unmanaged (plug-
and-play).
VLANs: Learn about Virtual Local Area Networks for
network segmentation.

3.Firewalls
Function: Control incoming and outgoing traffic based
on predefined rules.
Types: Packet filtering, stateful inspection, and
application-layer firewalls.

4.Access Points
Function: Allow wireless devices to connect to wired
networks.
Security: Understand WPA/WPA2/WPA3 encryption
methods.

5.Modems
Function: Convert digital signals to analog for
transmission over telephone lines.
Types: DSL, cable, and fiber modems.
Phase 3: IP Addressing

1.IPv4 Addressing
Format: Four octets (e.g., 192.168.1.1).
Classes: Understand Class A, B, C, D,
and E addresses and their uses.

2.IPv6 Addressing
Format: Eight groups of hexadecimal
digits (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7
334).
Benefits: Increased address space and
improved routing.

3.Subnetting
Concept: Dividing a network into
smaller sub-networks.
CIDR Notation: Understand how to
calculate subnets (e.g., /24 means
255.255.255.0).
Phase 4: Protocols

1.TCP
Characteristics: Connection-oriented,
reliable, ensures data integrity
through checksums.
Three-way handshake: SYN, SYN-
ACK, ACK process to establish a
connection.

2.UDP
Characteristics: Connectionless,
faster, but no guarantee of delivery or
order.
Used for applications where speed is
critical (e.g., gaming, streaming).

3.Application Layer Protocols


HTTP/HTTPS: Web traffic protocols;
HTTPS includes SSL/TLS encryption.
FTP/SFTP: Used for file transfer; SFTP
provides secure file transfer.
Phase 5: Network Topologies
1.Star Topology
All devices connected to a central
hub/switch.
Advantages: Easy to add/remove
devices; if one link fails, others remain
unaffected.

2.Bus Topology
All devices share a single communication
line.
Disadvantages: If the main cable fails, the
entire network goes down.
3.Ring Topology
Devices connected in a circular format;
data travels in one direction.
Disadvantages: A single point of failure
can disrupt the whole network.

4.Mesh Topology
Devices interconnected; multiple
pathways for data.
Advantages: Highly reliable; if one link
fails, data can take another route.
Phase 6: Common Security Concepts

1.Encryption
Protects data by converting it into
a secure format.
Important for securing sensitive
data in transit (e.g., SSL/TLS for
HTTPS).

2.VPN
A secure, encrypted connection
over the internet, allowing remote
access to a private network.

3.NAT
Allows multiple devices on a local
network to share a single public
IP address, adding a layer of
security.
Phase 7: Network Scanning and Enumeration
1.Common Vulnerabilities
Familiarize yourself with vulnerabilities
such as SQL injection, cross-site
scripting (XSS), and buffer overflows.

2.Scanning Tools
Nmap, Nessus, OpenVAS: For
identifying vulnerabilities in networks
and applications.

Phase 9: Wireless Networks


1.Wireless Security Protocols
WEP: Outdated and insecure; avoid
using.
WPA/WPA2: Improved security for
wireless networks; WPA3 is the latest
and most secure.

2.Wireless Assessment Tools


Tools like Aircrack-ng for assessing the
security of wireless networks.
Phase 10: Common Attacks

1.Man-in-the-Middle (MitM)
Attacker intercepts communication
between two parties.
Techniques: ARP spoofing, session
hijacking.

2.Denial of Service (DoS)


Overloading a network service to
make it unavailable.
Understand different types (e.g.,
SYN flood, DDoS).

3.Spoofing
Impersonating a trusted entity to
gain unauthorized access.
--Thank You--
Feel free to reach out if you have
any questions or need guidance.
Let’s secure the digital world
together! 💪
@follow on Linkedin

You might also like