Networking For Hackers
Networking For Hackers
Hackers!
Day12_network.md
Recalling!
LAST TIME
TOPICS
Topics
● Introduction to networking
● Classification of networks
● IP Address Technology
● Mac Address
● OSI Model
● TCP and UDP protocols
● TCP/IP Model
● Networking Devices
● Virtualization Network
Introduction to Networking
● A client is a
computer that
requests for
resources.
Server computer
● A server is a computer
that controls and
provides access to
resources.
● But have higher
RAM,CPU and
STORAGE
example
Server Rack
- Switch
- Modem
- Servers
- Firewall
- Display
- …
Need of Networks
● Enhance communication.
● Share resources.
● Facilitate centralized management
● Internet
Classification of Networks
● IP (Internet Protocol) is a
Network Layer Protocol.
● A way to identify
machines on a network
● A unique identifier
USAGE of IP’s
● Based On IP versions
○ IPv4
○ IPv6
IPv4 ( Internet protocol version 4)
1. 192.127.32.2
2. 192.259.22.1
3. 10.1.1.1
4. 192,168,1,1
…
● 0.0.0.0
● 127.0.0.0
● 128.0.0.0
● 191.255.0.0
● 192.0.0.0
● 223.255.255.0
IPv6 ( Internet Protocol Version 6)
● IPv6 is a 128-bit alphanumeric long value that identifies an
endpoint devices in IPv6 network.
● Format of an IPv6 address:
○ FE80:CD00:0000:0CDE:1257:0000:211E:729C
■ ALPHANumeric
■ Separated by colon(:)
■ IP generated automatically.
● The main difference is the IP-space(host holding) IPv4 holds 32-bit
ip address but IPv6 holds 128-bit ip Addresses.
● Total number of possible IPv4 addresses:
○ 232=4,294,967,296 (about 4.3 billion).
○ 2128=340,282,366,920,938,463,463,374,607,431,768,211,45
6. (Approximately 340 undecillion addresses).
Internet and intranet?
On windows:
●
ipconfig
…
On Linux
ifconfig
Public ip
Myth and truth
● WHY do we need IPv6?
○ Lack of IPv4, Even Class A with 16 Million Address is not enough for 8
billion Peoples. Peoples Came with Another Solution in addition to this,
“NAT”
● Internet Service Provider/ISP and IPv4’s
○ IP Address are limited, and Expensive
■ Specially in our country, we don’t have that much IP’s There for many
peoples have same IP address.
● Location of Person.
● Unique Identifier.
● Do Peoples Hack with IP address?
○ Static and Dynamic/DHCP
■ Client Computer and mobile Use Dynamic Assigning by default.
● Changed When you restart/reset ur phone or Router.
● Lack of IPv4 ( Poor Countries )
https://auctions.ipv4.global/
Network Address Translation ( NAT )
● NAT is a method used by routers to map multiple private IP addresses within a local
network to a single public IP address (or a few public IP addresses).
○ This allows devices in a private network to access the internet while conserving
public IP addresses.
● Provides a basic level of security by hiding internal IP addresses from the external
network (internet).
Private and Public IP addresses.
- Network protocols are the rules and conventions that govern how data is
transmitted and received over a network. They define the methods for
communication between network devices, ensuring data is properly
packaged, transmitted, and understood.
- These Protocols have their own, name and Abbreviation.
● Common Network Protocols
○ HTTP/HTTPS: Foundation of web browsing, used for transferring web pages.
○ TCP/IP: Core protocols for the Internet, managing data transmission.
○ FTP: Used for transferring files between computers.
○ DNS: Translates domain names into IP addresses.
○ SMTP: Protocol for sending emails.
Layer 7: Application Layer
● Level at which applications access network services.
○ Represents services that directly support
software applications for file transfers, database
access, and electronic mail, BROWSERS etc.
● Your data is DATA
○ PROTOCOLS: HTTP,FTP,SMTP
Layer 6: Presentation Layer
● Related to representation of transmitted data
○ Translates different data representations from the
Application layer into uniform standard format
● Providing services for secure efficient data
transmission
○ e.g. data encryption, and data compression.
● Your data is DATA
● PROTOCOLS: SSL
Layer 5: Session Layer
● Allows two applications on different computers to
establish, use, and end a session.
○ e.g. file transfer, remote login
● Establishes dialog control
○ Regulates which side transmits, when and how long it
transmits.
● Performs token management and synchronization.
● Your data is DATA
● PROTOCOLS: RPC,NETBIOS
Layer 4: Transport Layer
● Manages transmission packets
○ Repackages long messages when necessary into small packets for transmission
[ sender ]
○ Reassembles packets in correct order to get the original message. [ receiver ]
● Handles error recognition and recovery.
○ Transport layer at receiving acknowledges packet delivery.
○ Resends missing packets
● Your data is SEGMENTS
● PROTOCOLS: TCP,UDP
Layer 3: Network Layer
● Reliable
● Connection-Oriented protocol
○ Means it establishes a connection between the receiver
and sender.
■ It uses 3 way HandShake ( more on Network
Hacking Class )
● Used on emails, Chat,watching online videos, simple
browsing.
…
● Application,Presentation
and session layers are
combined together and
called APPLICATION
● Data link layer and
physical layer combined
and called network access
layer.
Networking tools
● Layer 7: Firewall
● Layer 6: NO DEVICE
● Layer 5: NO DEVICE
● Layer 4: NO DEVICE
● Layer 3: Routers, Layer 3 Switch
● Layer 2: Switch, Bridge
● Layer 1: Hub, Cables, Repeater
Layer 1: Hub
● Helps To
boost/amplify
the speed of the
internet, in long
route
Layer 1: Network Cables
● Widely used in
telecommunication and computer
networks, including Ethernet
networks (e.g., Cat5e, Cat6
cables).
● Over long distances, twisted pair
cables are more susceptible to
signal degradation compared to
coaxial and fiber optic cables.
Fiber Optics
● Operates at Layer 2 to
connect devices within
the same network.
● It uses MAC addresses
to forward data to the
correct destination.
● Vlans are done on
Switches
5,24,48,.. Ports
Layer 3: Routers
https://www.netacad.com/cisco-packet-tracer
Virtualization Network
192.168.1.2
3) Host-Only Networking
Video: https://www.youtube.com/watch?v=qulRjRFavJI
Questions
1. Submit the decimal representation of the subnet mask from the following CIDR:
10.200.20.0/27 (2pts)
2. Submit the broadcast address of the following CIDR: 10.200.20.0/27 (2pts)
3. Split the network 10.200.20.0/27 into 4 subnets and submit the network address of
the 3rd subnet as the answer. (3pts)
4. Split the network 10.200.20.0/27 into 4 subnets and submit the broadcast address of
the 2nd subnet as the answer. (3pts)
Will be posted on the google form , Use Google, Youtube and ChatGPT you have 15 days.
you will learn lot of things about subnetting, CIDR notations…, your season 2 exam will
include some part from it.
Season 1 Class is OVER
1) Do note
2) Read it again
3) ASK
4) Prepare Your Kali linux/Parrot machine
You have 1 week break and exam when you come back, also
finish Tuition Fee for Season 2(if you have paid let as know).