Ch 2: TCP/IP Concepts Review

Sam Bowne
Sam BowneInstructor at CCSF
Hands-On Ethical
Hacking and
Network Defense
Chapter 2
TCP/IP Concepts Review
Last modified 1-11-17
Objectives
• Describe the TCP/IP protocol stack
• Explain the basic concepts of IP addressing
• Explain the binary, octal, and hexadecimal
numbering system
Overview of TCP/IP
• Protocol
• Common language used by computers for speaking
• Transmission Control Protocol/Internet Protocol
(TCP/IP)
• Most widely used protocol
• TCP/IP stack
• Contains four different layers
• Network
• Internet
• Transport
• Application
Ch 2: TCP/IP Concepts Review
The Application Layer
• Front end to the lower-layer protocols
• What you can see and touch – closest to
the user at the keyboard
• HTTP, FTP, SMTP, SNMP, SSH, IRC and
TELNET all operate in the Application Layer
Ch 2: TCP/IP Concepts Review
The Transport Layer
• Encapsulates data into segments
• Segments can use TCP or UDP to reach a
destination host
• TCP is a connection-oriented protocol
• TCP three-way handshake
• Computer A sends a SYN packet
• Computer B replies with a SYN-ACK packet
• Computer A replies with an ACK packet
TCP Header Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Destination Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Acknowledgment Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data | |U|A|P|R|S|F| |
| Offset| Reserved |R|C|S|S|Y|I| Window |
| | |G|K|H|T|N|N| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum | Urgent Pointer |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options | Padding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| data |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
TCP Segment Headers
• Critical components:
• TCP flags
• Initial Sequence Number (ISN)
• Source and destination port
• Abused by hackers finding vulnerabilities
TCP Flags
• Each flag occupies one bit
• Can be set to 0 (off) or 1 (on)
• Six flags
• SYN: synchronize flag
• ACK: acknowledge flag
• PSH: push flag
• URG: urgent flag
• RST: reset flag
• FIN: finish flag
Initial Sequence Number (ISN)
• 32-bit number
• Tracks packets received
• Enables reassembly of large packets
• Sent on steps 1 and 2 of the TCP three-
way handshake
• By guessing ISN values, a hacker can hijack a
TCP session, gaining access to a server without
logging in
TCP Ports
• Port
• Logical, not physical, component of a TCP
connection
• Identifies the service that is running
• Example: HTTP uses port 80
• A 16-bit number – 65,536 ports
• Each TCP packet has a source and
destination port
Blocking Ports
• Helps you stop or disable services that are
not needed
• Open ports are an invitation for an attack
• You can’t block all the ports
• That would stop all networking
• At a minimum, ports 25 and 80 are usually open
on a server, so it can send out Email and Web
pages
TCP Ports (continued)
• Only the first 1023 ports are considered well-
known
• List of well-known ports
• Available at the Internet Assigned Numbers
Authority (IANA) Web site (www.iana.org)
• Ports 20 and 21
• File Transfer Protocol (FTP)
• Use for sharing files over the Internet
• Requires a logon name and password
• More secure than Trivial File Transfer Protocol
(TFTP)
Ch 2: TCP/IP Concepts Review
TCP Ports (continued)
• Port 25
• Simple Mail Transfer Protocol (SMTP)
• E-mail servers listen on this port
• Port 53
• Domain Name Service (DNS)
• Helps users connect to Web sites using URLs
instead of IP addresses
TCP Ports (continued)
• Port 69
• Trivial File Transfer
Protocol
• Used for transferring
router configurations
• Had the "Sorcer's
Apprentice Syndrome"
Denial-of-Service
vulnerability (link Ch2i)
• (image from luharu.com)
TCP Ports (continued)
• Port 80
• Hypertext Transfer Protocol (HTTP)
• Used when connecting to a Web server
• Port 110
• Post Office Protocol 3 (POP3)
• Used for retrieving e-mail
• Port 119
• Network News Transfer Protocol
• For use with newsgroups
TCP Ports (continued)
• Port 135
• Remote Procedure Call (RPC)
• Critical for the operation of Microsoft Exchange
Server and Active Directory
• Port 139
• NetBIOS
• Used by Microsoft’s NetBIOS Session Service
• File and printer sharing
19
TCP Ports (continued)
• Port 143
• Internet Message Access Protocol 4 (IMAP4)
• Used for retrieving e-mail
• More features than POP3
Demonstration
• Telnet to hills.ccsf.edu and netstat to see
the connections
• Port 23 (usual Telnet)
• Port 25 blocked off campus, but 110 connects
• Port 21 works, but needs a username and
password
Demonstration
• Wireshark Packet Sniffer
• TCP Handshake: SYN, SYN/ACK, ACK
• TCP

Ports
• TCP

Status

Flags
User Datagram Protocol (UDP)
• Fast but unreliable protocol
• Operates on transport layer
• Does not verify that the receiver is listening
• Higher layers of the TCP/IP stack handle
reliability problems
• Connectionless protocol
The Internet Layer
• Responsible for routing packets to their
destination address
• Uses a logical address, called an IP address
• IP addressing
• Packet delivery is connectionless
Internet Control Message Protocol
(ICMP)
• Operates in the Internet layer of the TCP/IP
stack
• Used to send messages related to network
operations
• Helps in troubleshooting a network
• Some commands include
• Ping
• Traceroute
ICMP Type Codes
33
Wireshark Capture of a PING
Warriors of the Net
• Network+ Movie
• Warriorsofthe.net (link Ch 2d)
IP Addressing
• Consists of four bytes, like 147.144.20.1
• Two components
• Network address
• Host address
• Neither portion may be all 1s or all 0s
• Classes
• Class A
• Class B
• Class C
Ch 2: TCP/IP Concepts Review
IP Addressing (continued)
• Class A
• First byte is reserved for network address
• Last three bytes are for host address
• Supports more than 16 million host computers
• Limited number of Class A networks
• Reserved for large corporations and governments
(see link Ch 2b)
• Format: network.node.node.node
IP Addressing (continued)
• Class B
• First two bytes are reserved for network address
• Last two bytes are for host address
• Supports more than 65,000 host computers
• Assigned to large corporations and Internet
Service Providers (ISPs)
• Format: network.network.node.node
• CCSF has 147.144.0.0 – 147.144.255.255
IP Addressing (continued)
• Class C
• First three bytes are reserved for network address
• Last byte is for host address
• Supports up to 254 host computers
• Usually available for small business and home
networks
• Format: network.network.network.node
IP Addressing (continued)
• Subnetting
• Each network can be assigned a subnet mask
• Helps identify the network address bits from the host
address bits
• Class A uses a subnet mask of 255.0.0.0
• Also called /8
• Class B uses a subnet mask of 255.255.0.0
• Also called /16
• Class C uses a subnet mask of 255.255.255.0
• Also called /24
Planning IP Address Assignments
• Each network segment must have a unique
network address
• Address cannot contain all 0s or all 1s
• To access computers on other networks
• Each computer needs IP address of gateway
42
Planning IP Address Assignments
• TCP/IP uses subnet mask to determine if
the destination computer is on the same
network or a different network
• If destination is on a different network, it relays
packet to gateway
• Gateway forwards packet to its next destination
(routing)
• Packet eventually reaches destination
IPv6
• Modern operating systems like Windows 7
use IPv6 in addition to IPv4
• IPv6 addresses are much longer: 128 bits
instead of the 32 bits used by IPv4
Binary
Binary, Hexadecimal, and Base64
• Binary: uses only 0 and 1
• Eight bits per byte
• Hexadecimal: uses 0-9 and a-f
• 4 bits per character
• Two characters per byte
• Base64
• 6 bits per character
• 4 characters for 3 bytes
Base 64 Encoding
Used to evade anti-spam tools, and to
obscure passwords
Encodes six bits at a time (0 – 63) with a
single ASCII character
■ A - Z: 0 – 25
■ a – z: 26 – 51
■ 1 – 9: 52 – 61
■ + and - 62 and 63
See links Ch 3a, 3b
ORACLE -> T1JBQ0xF
■ Link Ch 3r
Base64 Example
1 of 41

Recommended

CNIT 123 Ch 1: Ethical Hacking Overview by
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
7.9K views30 slides
Network security by
Network securityNetwork security
Network securityquest university nawabshah
14.9K views23 slides
Chapter 10 by
Chapter 10Chapter 10
Chapter 10bheemsain
3.3K views49 slides
Firewall in Network Security by
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Securitylalithambiga kamaraj
4.3K views22 slides
Cisco Networking (Routing and Switching) by
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
7.4K views26 slides

More Related Content

What's hot

Network Security Presentation by
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
80.3K views17 slides
Chapter 4 data link layer by
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
13K views61 slides
What is Ping by
What is PingWhat is Ping
What is PingDisha Dudhal
1.8K views12 slides
Point to point protocol | PPP - Nitish Jadia by
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaNitish Jadia
387 views45 slides
OSI Model by
OSI ModelOSI Model
OSI ModelSimran Kaur
1.5K views25 slides
Tcp and udp by
Tcp and udpTcp and udp
Tcp and udpAhmad Khalid Nasrat
36.9K views12 slides

What's hot(20)

Network Security Presentation by Allan Pratt MBA
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA80.3K views
Chapter 4 data link layer by Naiyan Noor
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor13K views
Point to point protocol | PPP - Nitish Jadia by Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
Nitish Jadia387 views
Transmission impairments(presentation) by Vivek Kumar
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar6.9K views
Access Control List (ACL) by ISMT College
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
ISMT College830 views
Error Detection and Correction - Data link Layer by Abdullaziz Tagawy
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy32.5K views
Tunneling vpn security and implementation by Mohibullah Saail
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
Mohibullah Saail301 views
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol) by Kruti Niranjan
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan11.5K views

Similar to Ch 2: TCP/IP Concepts Review

CISSP Prep: Ch 5. Communication and Network Security (Part 1) by
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)Sam Bowne
2.4K views73 slides
4. Communication and Network Security by
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
752 views216 slides
ADDRESSING PADA TCP IP by
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPJennifer Daniel
5 views78 slides
4. Communication and Network Security by
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
117 views216 slides
tcp ip protocols.ppt by
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.pptssuser3acfba
90 views47 slides
Tcp ip by
Tcp ipTcp ip
Tcp ipDheeraj Sadawarte
694 views30 slides

Similar to Ch 2: TCP/IP Concepts Review(20)

CISSP Prep: Ch 5. Communication and Network Security (Part 1) by Sam Bowne
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Sam Bowne2.4K views
4. Communication and Network Security by Sam Bowne
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne752 views
4. Communication and Network Security by Sam Bowne
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne117 views
Chapter 9 TCP IP Reference Model.ppt by hoangdinhhanh88
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppt
hoangdinhhanh8826 views
Chapter 9 TCP IP Reference Model.ppt by anwarkade1
Chapter 9 TCP IP Reference Model.pptChapter 9 TCP IP Reference Model.ppt
Chapter 9 TCP IP Reference Model.ppt
anwarkade13 views
Ismail TCP IP.pdf by helloraja
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
helloraja4 views
Ismail TCP IP.pdf by helloraja
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
helloraja7 views
WIFI MODEM Part-22 by Techvilla
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
Techvilla485 views

More from Sam Bowne

Cyberwar by
CyberwarCyberwar
CyberwarSam Bowne
15 views22 slides
3: DNS vulnerabilities by
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
40 views40 slides
8. Software Development Security by
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
24 views85 slides
4 Mapping the Application by
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
62 views88 slides
3. Attacking iOS Applications (Part 2) by
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
33 views45 slides
12 Elliptic Curves by
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
54 views50 slides

More from Sam Bowne(20)

3: DNS vulnerabilities by Sam Bowne
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne40 views
8. Software Development Security by Sam Bowne
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne24 views
4 Mapping the Application by Sam Bowne
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne62 views
3. Attacking iOS Applications (Part 2) by Sam Bowne
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne33 views
12 Elliptic Curves by Sam Bowne
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne54 views
11. Diffie-Hellman by Sam Bowne
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne58 views
2a Analyzing iOS Apps Part 1 by Sam Bowne
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne42 views
9 Writing Secure Android Applications by Sam Bowne
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne31 views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
12 Investigating Windows Systems (Part 1 of 3 by Sam Bowne
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne59 views
9. Hard Problems by Sam Bowne
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne43 views
8 Android Implementation Issues (Part 1) by Sam Bowne
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne23 views
11 Analysis Methodology by Sam Bowne
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne12 views
8. Authenticated Encryption by Sam Bowne
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne71 views
7. Attacking Android Applications (Part 2) by Sam Bowne
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne35 views
7. Attacking Android Applications (Part 1) by Sam Bowne
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne29 views
5. Stream Ciphers by Sam Bowne
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne108 views
6 Scope & 7 Live Data Collection by Sam Bowne
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne124 views

Recently uploaded

Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice by
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceTaste
45 views50 slides
Pharmaceutical Analysis PPT (BP 102T) by
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T) yakshpharmacy009
108 views29 slides
Nelson_RecordStore.pdf by
Nelson_RecordStore.pdfNelson_RecordStore.pdf
Nelson_RecordStore.pdfBrynNelson5
46 views10 slides
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37MysoreMuleSoftMeetup
50 views17 slides
Six Sigma Concept by Sahil Srivastava.pptx by
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptxSahil Srivastava
44 views11 slides
REFERENCING, CITATION.pptx by
REFERENCING, CITATION.pptxREFERENCING, CITATION.pptx
REFERENCING, CITATION.pptxabhisrivastava11
41 views26 slides

Recently uploaded(20)

Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice by Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste45 views
Pharmaceutical Analysis PPT (BP 102T) by yakshpharmacy009
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T)
yakshpharmacy009108 views
Nelson_RecordStore.pdf by BrynNelson5
Nelson_RecordStore.pdfNelson_RecordStore.pdf
Nelson_RecordStore.pdf
BrynNelson546 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Six Sigma Concept by Sahil Srivastava.pptx by Sahil Srivastava
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptx
Sahil Srivastava44 views
NodeJS and ExpressJS.pdf by ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR348 views
JRN 362 - Lecture Twenty-Three (Epilogue) by Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley41 views
UNIT NO 13 ORGANISMS AND POPULATION.pptx by Madhuri Bhande
UNIT NO 13 ORGANISMS AND POPULATION.pptxUNIT NO 13 ORGANISMS AND POPULATION.pptx
UNIT NO 13 ORGANISMS AND POPULATION.pptx
Madhuri Bhande42 views
11.30.23A Poverty and Inequality in America.pptx by mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239130 views
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... by Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...

Ch 2: TCP/IP Concepts Review

  • 1. Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17
  • 2. Objectives • Describe the TCP/IP protocol stack • Explain the basic concepts of IP addressing • Explain the binary, octal, and hexadecimal numbering system
  • 3. Overview of TCP/IP • Protocol • Common language used by computers for speaking • Transmission Control Protocol/Internet Protocol (TCP/IP) • Most widely used protocol • TCP/IP stack • Contains four different layers • Network • Internet • Transport • Application
  • 5. The Application Layer • Front end to the lower-layer protocols • What you can see and touch – closest to the user at the keyboard • HTTP, FTP, SMTP, SNMP, SSH, IRC and TELNET all operate in the Application Layer
  • 7. The Transport Layer • Encapsulates data into segments • Segments can use TCP or UDP to reach a destination host • TCP is a connection-oriented protocol • TCP three-way handshake • Computer A sends a SYN packet • Computer B replies with a SYN-ACK packet • Computer A replies with an ACK packet
  • 8. TCP Header Format 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Port | Destination Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Acknowledgment Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data | |U|A|P|R|S|F| | | Offset| Reserved |R|C|S|S|Y|I| Window | | | |G|K|H|T|N|N| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | Urgent Pointer | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | data | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  • 9. TCP Segment Headers • Critical components: • TCP flags • Initial Sequence Number (ISN) • Source and destination port • Abused by hackers finding vulnerabilities
  • 10. TCP Flags • Each flag occupies one bit • Can be set to 0 (off) or 1 (on) • Six flags • SYN: synchronize flag • ACK: acknowledge flag • PSH: push flag • URG: urgent flag • RST: reset flag • FIN: finish flag
  • 11. Initial Sequence Number (ISN) • 32-bit number • Tracks packets received • Enables reassembly of large packets • Sent on steps 1 and 2 of the TCP three- way handshake • By guessing ISN values, a hacker can hijack a TCP session, gaining access to a server without logging in
  • 12. TCP Ports • Port • Logical, not physical, component of a TCP connection • Identifies the service that is running • Example: HTTP uses port 80 • A 16-bit number – 65,536 ports • Each TCP packet has a source and destination port
  • 13. Blocking Ports • Helps you stop or disable services that are not needed • Open ports are an invitation for an attack • You can’t block all the ports • That would stop all networking • At a minimum, ports 25 and 80 are usually open on a server, so it can send out Email and Web pages
  • 14. TCP Ports (continued) • Only the first 1023 ports are considered well- known • List of well-known ports • Available at the Internet Assigned Numbers Authority (IANA) Web site (www.iana.org) • Ports 20 and 21 • File Transfer Protocol (FTP) • Use for sharing files over the Internet • Requires a logon name and password • More secure than Trivial File Transfer Protocol (TFTP)
  • 16. TCP Ports (continued) • Port 25 • Simple Mail Transfer Protocol (SMTP) • E-mail servers listen on this port • Port 53 • Domain Name Service (DNS) • Helps users connect to Web sites using URLs instead of IP addresses
  • 17. TCP Ports (continued) • Port 69 • Trivial File Transfer Protocol • Used for transferring router configurations • Had the "Sorcer's Apprentice Syndrome" Denial-of-Service vulnerability (link Ch2i) • (image from luharu.com)
  • 18. TCP Ports (continued) • Port 80 • Hypertext Transfer Protocol (HTTP) • Used when connecting to a Web server • Port 110 • Post Office Protocol 3 (POP3) • Used for retrieving e-mail • Port 119 • Network News Transfer Protocol • For use with newsgroups
  • 19. TCP Ports (continued) • Port 135 • Remote Procedure Call (RPC) • Critical for the operation of Microsoft Exchange Server and Active Directory • Port 139 • NetBIOS • Used by Microsoft’s NetBIOS Session Service • File and printer sharing
  • 20. 19 TCP Ports (continued) • Port 143 • Internet Message Access Protocol 4 (IMAP4) • Used for retrieving e-mail • More features than POP3
  • 21. Demonstration • Telnet to hills.ccsf.edu and netstat to see the connections • Port 23 (usual Telnet) • Port 25 blocked off campus, but 110 connects • Port 21 works, but needs a username and password
  • 22. Demonstration • Wireshark Packet Sniffer • TCP Handshake: SYN, SYN/ACK, ACK • TCP
 Ports • TCP
 Status
 Flags
  • 23. User Datagram Protocol (UDP) • Fast but unreliable protocol • Operates on transport layer • Does not verify that the receiver is listening • Higher layers of the TCP/IP stack handle reliability problems • Connectionless protocol
  • 24. The Internet Layer • Responsible for routing packets to their destination address • Uses a logical address, called an IP address • IP addressing • Packet delivery is connectionless
  • 25. Internet Control Message Protocol (ICMP) • Operates in the Internet layer of the TCP/IP stack • Used to send messages related to network operations • Helps in troubleshooting a network • Some commands include • Ping • Traceroute
  • 28. Warriors of the Net • Network+ Movie • Warriorsofthe.net (link Ch 2d)
  • 29. IP Addressing • Consists of four bytes, like 147.144.20.1 • Two components • Network address • Host address • Neither portion may be all 1s or all 0s • Classes • Class A • Class B • Class C
  • 31. IP Addressing (continued) • Class A • First byte is reserved for network address • Last three bytes are for host address • Supports more than 16 million host computers • Limited number of Class A networks • Reserved for large corporations and governments (see link Ch 2b) • Format: network.node.node.node
  • 32. IP Addressing (continued) • Class B • First two bytes are reserved for network address • Last two bytes are for host address • Supports more than 65,000 host computers • Assigned to large corporations and Internet Service Providers (ISPs) • Format: network.network.node.node • CCSF has 147.144.0.0 – 147.144.255.255
  • 33. IP Addressing (continued) • Class C • First three bytes are reserved for network address • Last byte is for host address • Supports up to 254 host computers • Usually available for small business and home networks • Format: network.network.network.node
  • 34. IP Addressing (continued) • Subnetting • Each network can be assigned a subnet mask • Helps identify the network address bits from the host address bits • Class A uses a subnet mask of 255.0.0.0 • Also called /8 • Class B uses a subnet mask of 255.255.0.0 • Also called /16 • Class C uses a subnet mask of 255.255.255.0 • Also called /24
  • 35. Planning IP Address Assignments • Each network segment must have a unique network address • Address cannot contain all 0s or all 1s • To access computers on other networks • Each computer needs IP address of gateway
  • 36. 42 Planning IP Address Assignments • TCP/IP uses subnet mask to determine if the destination computer is on the same network or a different network • If destination is on a different network, it relays packet to gateway • Gateway forwards packet to its next destination (routing) • Packet eventually reaches destination
  • 37. IPv6 • Modern operating systems like Windows 7 use IPv6 in addition to IPv4 • IPv6 addresses are much longer: 128 bits instead of the 32 bits used by IPv4
  • 39. Binary, Hexadecimal, and Base64 • Binary: uses only 0 and 1 • Eight bits per byte • Hexadecimal: uses 0-9 and a-f • 4 bits per character • Two characters per byte • Base64 • 6 bits per character • 4 characters for 3 bytes
  • 40. Base 64 Encoding Used to evade anti-spam tools, and to obscure passwords Encodes six bits at a time (0 – 63) with a single ASCII character ■ A - Z: 0 – 25 ■ a – z: 26 – 51 ■ 1 – 9: 52 – 61 ■ + and - 62 and 63 See links Ch 3a, 3b
  • 41. ORACLE -> T1JBQ0xF ■ Link Ch 3r Base64 Example