Ethical Hacking Unit 1 - Full Notes
Ethical Hacking Unit 1 - Full Notes
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Ethical Hacking
Ethical hacking is to scan vulnerabilities and to
find potential threats on a computer or network
Ethical Hacker
An ethical hacker finds the weak points or
loopholes in a computer, web application or network
and reports them to the organization.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Email Hacking – In the digital world of the corporate sector, emails contain
extremely sensitive data & information that hackers may be interested in. Email
hacking can include hacking into the network to get email passwords and gaining
unauthorized access to the email of an individual or employees of a business. This
can expose an individual's personal life or reveal sensitive data from business
emails. A phishing attack (widespread) can also lead to users compromising their
personal information or data security.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Hackers utilize the data stored on the computer and on the servers to access
the passwords to any website, computer, email, accounts, etc., and then use that
information for malicious purposes. Ethical hackers use similar methods to do so and
identify any security measures that can be followed to prevent this.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE
GAINING ACCESS
Front door Software vulnerability exploitation
• Password guessing • Often advertised on the OEMs
• Password/key stealing (Original Equipment Manufactures)
web site along with security patches.
Back doors • Fertile ground for script kiddies
• Often left by original developers as looking for something to do.
debug and /or diagnostic tools.
Trojan Horses
• Usually hidden inside of software that
we download and install from the net.
• Many install backdoors.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Once inside, the hacker can...
Modify logs : To cover their tracks.
Steal files : Sometimes destroy after stealing.
An expert hacker would steal and cover their
tracks to remain undetected.
Modify files : To let you know they were there.
To cause mischief.
Install back doors : So, they can get in again.
Attack other systems
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Ethical Hacking - Terminologies
• Adware − Adware is software designed to force pre-chosen ads to display on your system.
• Attack − An attack is an action that is done on a system to get its access and extract sensitive data.
• Back door − A back door, or trap door, is a hidden entry to a computing device or software that
bypasses security measures, such as logins and password protections.
• Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher
rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP
or Telnet at a higher rate or calling script to create objects at a higher rate.
• Brute force attack − A brute force attack is an automated and the simplest kind of method to gain
access to a system or website. It tries different combination of usernames and passwords, over and
over again, until it gets in.
• Cracker − A cracker is one who modifies the software to access the features which are considered
undesirable by the person cracking the software, especially copy protection features.
• Data breach – Data breach is the term used when the cyber-security incident takes place where sensitive
information is accessed without authority.
• Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a
server or a network resource unavailable to users, usually by temporarily interrupting or suspending
the services of a host connected to the Internet.
• DDoS − Distributed denial of service attack.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Ethical Hacking - Terminologies
• Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network
while allowing safe communication between systems and users on the inside of the firewall.
• Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer
(and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by
gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device
using a Trojan delivered by a phishing email.
• Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software,
including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other
malicious programs.
• Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails,
in an attempt to gather personal and financial information from recipients.
• Social engineering − Social engineering implies deceiving someone with the purpose of acquiring sensitive
and personal information, like credit card details or user names and passwords.
• Spam − A Spam is simply an unsolicited email, also known as junk email, sent to a large number of
recipients without their consent.
• Spoofing − Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder
sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Ethical Hacking - Terminologies
• Spyware − Spyware is software that aims to gather information about a person or organization
without their knowledge and that may send such information to another entity without the
consumer's consent, or that asserts control over a computer without the consumer's knowledge.
• SQL Injection − SQL injection is an SQL code injection technique, used to attack data-driven
applications, in which malicious SQL statements are inserted into an entry field for execution (e.g.
to dump the database contents to the attacker).
• Trojan − A Trojan, or Trojan Horse, is a malicious program disguised to look like a valid program,
making it difficult to distinguish from programs that are supposed to be there designed with an
intention to destroy files, alter information, steal passwords or other information.
• Virus − A virus is a malicious program or a piece of code which is capable of copying itself and
typically has a detrimental effect, such as corrupting the system or destroying data.
• Vulnerability − A vulnerability is a weakness which allows a hacker to compromise the security
of a computer or network system.
• Worms − A worm is a self-replicating virus that does not alter files but resides in active memory
and duplicates itself.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Introduction to Ethical Hacking
Penetration-Testing Methodologies
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
3. Routers
A router is a physical networking device, which forwards data packets between
networks. Routers do the data analysis, perform the traffic directing functions on the
network, and define the top route for the data packets to reach their destination node. A data
packet may have to surpass multiple routers present within the network until it reaches its
destination.
4. Switches
In a computer network, a switch is a device that connects other devices and helps in
node-to-node communication by deciding the best way of transmitting data within a
network (usually if there are multiple routes in a more extensive network).
Though a router also transmits information, it forwards the information only between
networks, whereas a switches forwards data between nodes present in a single network.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
Switching is further classified into three types, which are as follows:
•Circuit Switching
•Packet Switching
•Message Switching
•Circuit Switching: In this switching type, a secure communication path is established
between nodes (or the sender and receiver) in a network. It establishes a dedicated
connection path before transferring the data, and this path assures a good transmission
bandwidth and prevents any other traffic from traveling on that path. For example, the
Telephone network.
•Packet Switching: With this technique, a message is broken into independent components
known as packets. Because of their small size, each packet is sent individually. The packets
traveling through the network will have their source and destination IP address.
•Message Switching: This switching technique uses the store and forward mechanism. It
sends the complete unit of the message from the source node, passing from multiple switches
until it reaches its intermediary node. It is not suitable for real-time applications.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
5. Ports
A port allows the user to access multiple applications by identifying a
connection between network devices. Each port is allocated a set of string numbers. If you
relate the IP address to a hotel's address, you can refer to ports as the hotel room number.
Network devices use port numbers to decide which application, service, or method is used to
forward the detailed information or the data.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
Network Topology
"Network topology is defined as the arrangement of computers or
nodes of a computer network to establish communication among
all.“
NODE
A node refers to a device that can transmit, receive, create, or
store information.
The nodes are connected via a network link that could be either wired
(cables, Ethernet) or wireless (Bluetooth, Wi-Fi).
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
Mesh topology, every node in the network connection is
directly connected to one other forming overlapping
connections between the nodes.
•This topology delivers better fault tolerance because if
any network device fails, it won't affect the network, as
other devices can transfer information.
•The Mesh networks self-configure and self-organize,
finding the quickest, most secure way to transmit the
data.
•One can form a full mesh topology by connecting every
single node to another node in the network. Full mesh is
expensive and is only used in the networks, which
demands high data redundancy.
•Another type of mesh topology is partial mesh
topology, where only a few devices are connected, and
few are connected to the devices with which they share
the most information. This mesh type is applicable in the
networks, requiring less redundancy or a cost-effective
network topology that is easy to execute.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Fundamentals of computer networking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
Introduction
• TCP/IP is the most fundamental protocol used in the Internet.
• Allows computers to communicate / share resources.
• Used as a standard.
• To bridge the gap between non-compatible platforms.
• Work on TCP/IP started in the 1970s.
• Funded by US Military.
• Advanced Research Project Agency (ARPA).
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
Network Layering in TCP/IP
• In 1978, Interna5onal Standards Organization (ISO) proposed the 7-layer OSI reference
model for network services and protocols.
• TCP/IP does not strictly follow the OSI model.
Host– to - Host
Point-to-point
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
SYN
(Synchronize Sequence
Number).
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - TCP/IP PROTOCOL STACK
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
IP Addressing
➢ An IP address is an address having information about how to reach a
specific host, especially outside the LAN. An IP address is a 32-bit
unique address having an address space of 232.
➢ Generally, there are two notations in which the IP address is written,
dotted decimal notation and hexadecimal notation.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
Hexadecimal Notation
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
Classful Addressing
The 32-bit IP address is divided into five sub-classes. These are:
Class A (Unicast) Class B (Unicast) Class C (Unicast)
Class D (Multicast) Class E (Reserved)
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
CLASS D CLASS E
IP address belonging to class D is reserved for multi- Class B is assigned to networks that range from
casting. medium-sized to large-sized networks.
The higher-order bits of the first octet of IP addresses The higher-order bits of the first octet of class E are
belonging to class D is always set to 1110. always set to 1111.
The network ID is 8 bits long. The network ID is 16 bits long.
The host ID is 24 bits long. The host ID is 16 bits long.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
IP Routing:
▪ IP routing is the process that defines the shortest path through
which data travels to reach from source to destination.
▪ It determines the shortest path to send the data from one computer
to another computer in the same or different network.
▪ Routing uses different protocols for the different networks to find the
path that data follows.
▪ It defines the path through which data travel across multiple
networks from one computer to other.
▪ Forwarding the packets from source to destination via different
routers is called routing.
▪ The routing decision is taken by the routers.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
Routing Protocols:
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Addressing and Routing
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Subnets
IP Subnets
When a bigger network is divided into smaller networks,
to maintain security, then that is known as Subnetting. So,
maintenance is easier for smaller networks
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Subnets
Uses of Subnetting
1.Subnetting helps in organizing the network in an efficient
way which helps in expanding the technology for large firms
and companies.
2.Subnetting is used for specific staffing structures to reduce
traffic and maintain order and efficiency.
3.Subnetting divides domains of the broadcast so that traffic
is routed efficiently, which helps in improving network
performance.
4.Subnetting is used in increasing network security.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Subnets
Advantages of Subnetting
The advantages of Subnetting are mentioned below:
1.It provides security to one network from another network. eg)
In an Organisation, the code of the Developer department
must not be accessed by another department.
2.It may be possible that a particular subnet might need higher
network priority than others. For example, a Sales department
needs to host webcasts or video conferences.
3.In the case of Small networks, maintenance is easy.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Subnets
Disadvantages of Subnetting
The disadvantages of Subnetting are mentioned below:
1.In the case of a single network, only three steps are required to reach
a Process i.e Source Host to Destination Network, Destination Network
to Destination Host, and then Destination Host to Process.
2.In the case of a Single Network only two IP addresses are wasted to
represent Network Id and Broadcast address but in the case of
Subnetting two IP addresses are wasted for each Subnet.
3.The cost of the overall Network also increases. Subnetting requires
internal routers, Switches, Hubs, Bridges, etc. which are very costly.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Subnets
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
What is IP Address?
The address through which any computer
communicates with our computer is simply called an Internet
Protocol Address or IP address.
For Example, If we want to load a web page or we want
to download something, we require the address for delivery
of that particular file or webpage. That address is called an IP
Address.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
Types of IP Address
1.IPv4 (Internet Protocol Version 4)
2.IPv6 (Internet Protocol Version 6)
IPv4
IPv4 address consists of two things that are the network address and the host
address. It stands for Internet Protocol version four.
It was introduced in 1981 by DARPA and was the first deployed version in 1982 for
production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation. It
is represented by 4 numbers separated by dots in the range of 0-255, which have to
be converted to 0 and 1, to be understood by Computers. For Example, An IPv4
Address can be written as 189.123.123.90.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
Difference Between IPv4 and IPv6
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address configuration It supports Auto and renumbering address configuration
In IPv4 end to end, connection integrity is Unachievable In IPv6 end-to-end, connection integrity is Achievable
The Security feature is dependent on the application IPSEC is an inbuilt security feature in the IPv6 protocol
Fragmentation performed by Sender and forwarding routers In IPv6 fragmentation is performed only by the sender
In IPv6 packet flow identification are Available and uses the flow
In IPv4 Packet flow identification is not available
label field in the header
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
Difference Between IPv4 and IPv6
IPv4 IPv6
In IPv4 checksum field is available In IPv6 checksum field is not available
In IPv6 multicast and anycast message transmission scheme is
It has a broadcast Message Transmission Scheme
available
In IPv4 Encryption and Authentication facility not provided In IPv6 Encryption and Authentication are provided
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are separated by addresses dot (.) IPv6 consists of 8 fields, which are separated by a colon (:)
IPv4 supports VLSM(Variable Length subnet mask). IPv6 does not support VLSM.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
Need for IPv6:
1. Large address space
An IPv6 address is 128 bits long .compared with the 32 bit address of IPv4, this is a huge(2 raised 96
times) increases in the address space.
2. Better header format
IPv6 uses a new header format in which options are separated from the base header and inserted,
when needed, between the base header and the upper layer data . This simplifies and speeds up the routing
process because most of the options do not need to be checked by routers.
3. New options
IPv6 has new options to allow for additional functionalities.
4. Allowance for extension
IPv6 is designed to allow the extension of the protocol if required by new technologies or applications.
5. Support for resource allocation
In IPv6,the type of service field has been removed, but two new fields , traffic class and flow label have
been added to enables the source to request special handling of the packet . this mechanism can be used to
support traffic such as real-time audio and video.
6. Support for more security
The encryption and authentication options in IPv6 provide confidentiality and integrity of the packet.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
IPv6 ADDRESSING METHODS
1. Unicast Address
Unicast Address identifies a single network interface. A packet sent to a unicast address
is delivered to the interface identified by that address.
2. Multicast Address
Multicast Address is used by multiple hosts, called as groups, acquires a multicast
destination address. These hosts need not be geographically together. If any packet is sent to
this multicast address, it will be distributed to all interfaces corresponding to that multicast
address. And every node is configured in the same way. In simple words, one data packet is sent
to multiple destinations simultaneously.
3. Anycast Address
Anycast Address is assigned to a group of interfaces. Any packet sent to an anycast
address will be delivered to only one member interface (mostly nearest host possible).
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
ADVANTAGES OF IPV6 :
1. Realtime Data Transmission : Realtime data transmission refers to the process of transmitting
data in a very fast manner or immediately. Example : Live streaming services such as cricket matches,
or other tournament that are streamed on web exactly as soon as it happens with a maximum delay
of 5-6 seconds.
2. IPv6 supports authentication: Verifying that the data received by the receiver from the sender is
exactly what the sender sent and came through the sender only not from any third party. Example :
Matching the hash value of both the messages for verification is also done by IPv6.
3. IPv6 performs Encryption: Ipv6 can encrypt the message at network layer even if the protocols of
application layer at user level didn’t encrypt the message which is a major advantage as it takes care
of encryption.
4. Faster processing at Router: Routers are able to process data packets of Ipv6 much faster due to
smaller Base header of fixed size – 40 bytes which helps in decreasing processing time resulting in
more efficient packet transmission. Whereas in Ipv4, we have to calculate the length of header which
lies between 20-60 bytes.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - IP Version 6
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.