A Penetration Testing Framework
How network is connected together? via cables or wireless
These protocols are responsible for making sure that a signal sent by a system finds its way to it's destination.
There are two general ways systems can communcate on a network:
Establishing a channel for each connection allows ATM to provide Quality of Service (QoS). When setting up a virtual circuit, switches along the path can be requested to allocate the desired amount of bandwidth " I need 1MB to support a video conference, Do you have that much available?" If answer is "Yes" then a virtual circuit is created, if the answer is "No" we search for another switch.
PVC is set up in advance usually manually.
Is established automatically on the fly
Allowing n sites to directly communicate with each one another would require n+1 links. In such situation it's better to use Packet-Switched technology. e.g Frame Relay
It's a wan technology similar to Ethernet and Token Ring in that it's based on packet switching.
Lowering the costs of the WAN instead of using dedicated direct links between sites, you will use the Frame Relay Cloud.
Todays the standard for the modern ethernet networks is to use CAT 5 or CAT 6 cables
Better option will be a device that operates on the cable level to sniff all the data.
The basic princible of stack based communication is that: Data from one layer of the stack can only be understood by the corresponding layer from the remote computer
This layer independence does have a security implications: for example giving a wrong ip adress for a specific dns service, id IP and DNS layers work together they would probably notice the fake IP, but because they work independently from each other they will not notice that. You need security software to check all the layer and make sure the headers are showing the correct info.
Not used any more as it's a waste of ips. It has been supplanted by CIDR
Limited broadcasts are used when computers boot so they can optain DHCP lease or otherwise configure network interfaces.
%systernroot%\system32\drivers\etc\hosts
with a second similar file in the same directory called lrnhosts
that contains additional mappings for NetBIOS to lP address translations.
$ nslookup www.yahoo.com
## Answers that come from cache are referred to as `non-authoritative` answers because a DNS server that does not house the actual database for that domain supplied them.
$ nslookup 216.109.118.72
Other important UDP-based protocols include:
TCP often is a network programmer's protocol of choice. It is probably the easier of the two protocols to program for, because most of the error handling is down inside the transport layer and out of sight from the application code.
PORT
command. The effect is that a user can cause an FTP server to open a connection from the FTP server directly based upon commands entered through an FTP command/control channel.that will have no knowledge about the mechanics of the different ports being requested to be opened for FTP. This type of firewall will require the following ports to be opened for FTP to function:
That's a lot of traffic to be permitted through a firewall.
The high traffic essentially provides a mechanism for unauthorized services to be accessible to or from the FTP server that may have nothing to do with FTP at all.
This loose security model can magnify the problems mentioned previously with respect to bounce scans with the PORT
command and can provide a mechanism for a potentially infected FTP server to have a backdoor installed that is listening on an obscure high port.
If you are stuck with such a firewall, it would be better to disable passive FTP altogether, as active ftp is much less permissive in what it permits through the firewall.
It would be better, however, to use a stateful firewall that has additional knowledge of the FTP protocol and can dynamically open ports for the data channel based upon reading into command channel packets.
This type of firewall will always permit 21/TCP inbound (and the stateful replies outbound) for valid connections and will prevent the need to leave all of the ephemeral ports wide open at all times, either from 20/TCP or from all ephemeral ports.
Layer 3 (Network layer) protocol
Purposes:
Works differently; might produce different results
traceroute
uses UDP packetstracert
uses ICMP packetsNot only is traceroute a great tool for determining paths through the network, but it is also a pretty decent network mapper.
By carefully examining the output of several runs to different hosts on the same remote network, you can start to notice similarities and differences.
!()[images/common_ports.jpg]