0% found this document useful (0 votes)
23 views39 pages

Chapter 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views39 pages

Chapter 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Introduction to Ethical

Hacking
Chapter 1
Content
• Fundamentals of Computer Networks/IP protocol stack
• IP addressing and routing
• Routing protocol
• Protocol vulnerabilities
• Steps of ethical hacking
• Demonstration of Routing Protocols using Cisco Packet Tracer
• Self-learning Topics: TCP/IP model, OSI model
Fundamentals of Computer Networks/IP
protocol stack
• NETWORKS
• A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other nodes on the
network.
Network Connection
Network Topologies
Mesh
Star
Bus
Ring
Categories of Networks
• LAN (Local Area Network)
• WAN (Wide Area Network)
• MAN (Metropolitan Area Network)
• Internetwork
THE OSI MODEL
TCP/IP MODEL
IP Address
• An IP address is a unique address that identifies a device on the internet
or a local network.
• IP stands for "Internet Protocol," which is the set of rules governing the
format of data sent via the internet or local network.
• Layer 3 Address
• The maximum value of a 32-bit number is 232, or 4,294,967,296. So the
maximum number of IPv4 addresses, which is called its address space, is
about 4.3 billion.
• A major advantage of IPv6 is that it uses 128 bits of data to store an
address, permitting 2128 unique addresses, or
340,282,366,920,938,463,463,374,607,431,768,211,456. The size of IPv6's
address space — 340 duodecillion — is much, much larger than IPv4.
Subnet Mask
• A subnet mask is a 32-bit number created by setting host bits to all 0s
and setting network bits to all 1s.
• the subnet mask separates the IP address into the network and host
addresses.
IP Address
Private and Public IP addresses
• Private IP address of a system is the IP address that is used
to communicate within the same network. Using private IP
data or information can be sent or received within the same
network. Range:
• 10.0.0.0 – 10.255.255.255,
172.16.0.0 – 172.31.255.255,
192.168.0.0 – 192.168.255.255

• Public IP address of a system is the IP address that is used to


communicate outside the network. A public IP address is
basically assigned by the ISP (Internet Service Provider).
How to assign IP address?
• Static
• Dynamic (DHCP)
Router
• Routers are networking devices operating at layer 3 or a network layer
of the OSI model.
• They are responsible for receiving, analysing, and forwarding data
packets among the connected computer networks.
• When a data packet arrives, the router inspects the destination
address, consults its routing tables to decide the optimal route and
then transfers the packet along this route
Static Routing
• Static routing is a routing type in which a network
administrator configures the routes into the routing
table to be used by the router to send packets to a
destination network.
• Static route can be used to:
• Reduce the number of routes advertised by a router.
• Create a backup route if the primary route fails.
• To connect a device to a specific network
• To connect a stub router or a stub network.
• Advantages of static routing
• It provides easy routing table maintenance in networks.
• Static routing consumes less bandwidth when compared to
dynamic routing as no CPU cycles are-used in route calculation
and communication.
• Because static routes do not advertise their route over the
network, it results in better network security.
• Limitations of static routing
• In large networks, configuring and adding a static route to the
routing table is very difficult.
• Configuring static routes requires background knowledge of the
network topology by the network administrator.
• Static route is error-prone.
Dynamic Routing
• Dynamic routing is a technique in which a router learns
about routing information without an administrator’s help
and adds the best route to its routing table.
• A router running a dynamic routing protocol adds the best
route to its routing table and can also determine another
path if the primary route goes down.
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
• Routing Information Protocol (RIP) is a distance-vector routing
protocol. Routers running the distance-vector protocol send all or a
portion of their routing tables in routing-update messages to their
neighbors.
• Routing Information Protocol (RIP) uses hop count as the metric to
rate the value of different routes.
• The hop count is the number of devices that can be traversed in a
route.
• A directly connected network has a metric of zero; an unreachable
network has a metric of 16.
Interior Gateway Routing Protocol
(IGRP)
• IGRP is a distance-vector routing protocol that considers a composite
metric which, by default, uses bandwidth and delay as parameters
instead of hop count.
• IGRP has a maximum hop limit of 100, by default, and can be
configured to support a network diameter of 255.
• IGRP is a classful protocol and cannot implement VLSM or CIDR. IGRP
summarizes at network boundaries
Open Shortest Path First (OSPF)
• With OSPF, there is no limitation on the hop count.
• The intelligent use of VLSM is very useful in IP address allocation.
• OSPF uses IP multicast to send link-state updates. This ensures less
processing on routers that are not listening to OSPF packets. Also,
updates are only sent in case routing changes occur instead of
periodically. This ensures a better use of bandwidth.
• OSPF has better convergence than RIP. This is because routing
changes are propagated instantaneously and not periodically.
• OSPF allows for better load balancing.
Enhanced Interior Gateway Routing
Protocol (EIGRP)
• EIGRP is a classless protocol that permits the use of VLSMs and that
supports CIDR for the scalable allocation of IP addresses.
• EIGRP does not send routing updates periodically, as does IGRP.
• EIGRP allows for authentication with simple passwords or with MD5.
• EIGRP is an advanced distance-vector protocol that implements some
characteristics similar to those of link-state protocols.
• EIGRP advertises its routing table to its neighbors as distance-vector
protocols do, but it uses hellos and forms neighbor relationships as
link-state protocols do.
Border Gateway Protocol (BGP)
• As networks interact with each other, they need a way to
communicate.
• Border Gateway Protocol (BGP) refers to a gateway protocol that
enables the internet to exchange routing information between
autonomous systems (AS).
• Much like the post office processing mail, BGP picks the most efficient
routes for delivering Internet traffic.
Hacker
• Hacker is the one who is smart enough to steal the information such
as Business data, personal data, financial information, credit card
information, username & Password from the system he is
unauthorized to get this information by taking unauthorized control
over that system using different techniques and tools.
Hacking
• The Term "Hacking" in information security refers to exploiting the
vulnerabilities in a system, compromising the security to gain
unauthorized command and control over the system resources.
• Purpose of hacking may include modification of system resources,
disruption of features and services to achieve goals.
Hacking Phases
Ethical Hacking
• Ethical hacking involves an authorized attempt to gain unauthorized
access to a computer system, application, or data.
Routing Vulnerabilities
• These vulnerabilities can be exploited by attackers to compromise the
security of a system, steal sensitive information, or carry out other
malicious actions.
• Examples of protocol vulnerabilities include buffer overflows,
unencrypted data transmission, and insufficient authentication
mechanisms.
• The four main types of vulnerabilities in information security
are network vulnerabilities, operating system vulnerabilities, process
(or procedural) vulnerabilities, and human vulnerabilities.
RIP PROTOCOL VULNERABILITIES
• RIP does not provide any native security features, making it
vulnerable to attacks such as spoofing and tampering.
• Advertise false routes, Causes traffic to go though compromised
hosts
OSPF VULNERABILITIES
• Link State Advertisements (LSAs) are messages communicated via
multicast to other routers in the OSPF domain.
• Although OSPF supports authentication and fight-back mechanism, it
is vulnerable to different types of LSA falsification.
• LSA falsification is mainly classified into self-LSA and other-LSA.
• Self-LSA falsification occurs when an attacker within a router falsifies
only the router’ s LSA.
• In other-LSA, the attacker forces a target router to send a false LSA on
behalf of other routers within the same AS.

You might also like