Chapter 1
Chapter 1
Hacking
Chapter 1
Content
• Fundamentals of Computer Networks/IP protocol stack
• IP addressing and routing
• Routing protocol
• Protocol vulnerabilities
• Steps of ethical hacking
• Demonstration of Routing Protocols using Cisco Packet Tracer
• Self-learning Topics: TCP/IP model, OSI model
Fundamentals of Computer Networks/IP
protocol stack
• NETWORKS
• A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other nodes on the
network.
Network Connection
Network Topologies
Mesh
Star
Bus
Ring
Categories of Networks
• LAN (Local Area Network)
• WAN (Wide Area Network)
• MAN (Metropolitan Area Network)
• Internetwork
THE OSI MODEL
TCP/IP MODEL
IP Address
• An IP address is a unique address that identifies a device on the internet
or a local network.
• IP stands for "Internet Protocol," which is the set of rules governing the
format of data sent via the internet or local network.
• Layer 3 Address
• The maximum value of a 32-bit number is 232, or 4,294,967,296. So the
maximum number of IPv4 addresses, which is called its address space, is
about 4.3 billion.
• A major advantage of IPv6 is that it uses 128 bits of data to store an
address, permitting 2128 unique addresses, or
340,282,366,920,938,463,463,374,607,431,768,211,456. The size of IPv6's
address space — 340 duodecillion — is much, much larger than IPv4.
Subnet Mask
• A subnet mask is a 32-bit number created by setting host bits to all 0s
and setting network bits to all 1s.
• the subnet mask separates the IP address into the network and host
addresses.
IP Address
Private and Public IP addresses
• Private IP address of a system is the IP address that is used
to communicate within the same network. Using private IP
data or information can be sent or received within the same
network. Range:
• 10.0.0.0 – 10.255.255.255,
172.16.0.0 – 172.31.255.255,
192.168.0.0 – 192.168.255.255