Submit Search
Upload
ITET1 Routing Application layer.odp
•
Download as ODP, PDF
•
0 likes
•
264 views
M
Morten Nielsen
Follow
Report
Share
Report
Share
1 of 15
Download now
Recommended
Walks through the basics of the HTTP protocol, URLs, cookies and caching, with tricks and tips that can be used by web developers. From a Geek.class I did on Oct 6, 2011 for Meet the Geeks.
Under the Covers with the Web
Under the Covers with the Web
Trevor Lohrbeer
02 wireshark http-sept_15_2009
02 wireshark http-sept_15_2009
Vothe Dung
[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports
Perforce
Internatinoal Journals Call for paper: http://www.iiste.org/Journals
Ftp servlet
Ftp servlet
Alexander Decker
Quick introduction to project management
Itt1 intro project management
Itt1 intro project management
Morten Nielsen
Chapter 10: Objectives -------------------------------------------------- By the end of this chapter, you will be able to: Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications. Describe how common application layer protocols interact with end user applications. Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email. Describe application layer protocols that provide IP addressing services, including DNS and DHCP. Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, File Sharing Services, SMB protocol. Explain how data is moved across the network, from opening an application to receiving data. Yaser Rahmati | یاسر رحمتی Rahmati Academy | آکادمی رحمتی www.yaser-rahmati.ir www.rahmati-academy.ir
Chapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
OSI: is a layered, abstract representation created as a guideline for network protocol design. Application Layer, provides human interface to the network. Differnces between the function of OSI application, presentation and session layers. The two forms of software programs that provide access to the network which are network-aware applications and application layer services. The difference between applications, services and protocols. Client Server Model. Peer-to-Peer (P2P) Networking and Applications. Application layer Protocols and Port numbers, ex. DNS - TCP/UDP Port 53, FTP - TCP Ports 20 and 21 and SMTP - TCP Port 25. Root DNS Servers and TLD Servers. Different Application layer protocols such as HTTP, HTTPS, FTP, Telnet, SSH, DHCP, DNS, SMTP, POP3, SMB and Gnutella Protocol
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
Application Layer
Application Layer
Application Layer
Dr Shashikant Athawale
Recommended
Walks through the basics of the HTTP protocol, URLs, cookies and caching, with tricks and tips that can be used by web developers. From a Geek.class I did on Oct 6, 2011 for Meet the Geeks.
Under the Covers with the Web
Under the Covers with the Web
Trevor Lohrbeer
02 wireshark http-sept_15_2009
02 wireshark http-sept_15_2009
Vothe Dung
[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports
Perforce
Internatinoal Journals Call for paper: http://www.iiste.org/Journals
Ftp servlet
Ftp servlet
Alexander Decker
Quick introduction to project management
Itt1 intro project management
Itt1 intro project management
Morten Nielsen
Chapter 10: Objectives -------------------------------------------------- By the end of this chapter, you will be able to: Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications. Describe how common application layer protocols interact with end user applications. Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email. Describe application layer protocols that provide IP addressing services, including DNS and DHCP. Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, File Sharing Services, SMB protocol. Explain how data is moved across the network, from opening an application to receiving data. Yaser Rahmati | یاسر رحمتی Rahmati Academy | آکادمی رحمتی www.yaser-rahmati.ir www.rahmati-academy.ir
Chapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
OSI: is a layered, abstract representation created as a guideline for network protocol design. Application Layer, provides human interface to the network. Differnces between the function of OSI application, presentation and session layers. The two forms of software programs that provide access to the network which are network-aware applications and application layer services. The difference between applications, services and protocols. Client Server Model. Peer-to-Peer (P2P) Networking and Applications. Application layer Protocols and Port numbers, ex. DNS - TCP/UDP Port 53, FTP - TCP Ports 20 and 21 and SMTP - TCP Port 25. Root DNS Servers and TLD Servers. Different Application layer protocols such as HTTP, HTTPS, FTP, Telnet, SSH, DHCP, DNS, SMTP, POP3, SMB and Gnutella Protocol
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
Application Layer
Application Layer
Application Layer
Dr Shashikant Athawale
HTML/XHTML and HTTP Basics Review PHP and the Web Server Architecture Model Overview of PHP Capabilities CGI vs. Shared Object Model
PHP Training: Module 1
PHP Training: Module 1
hussulinux
HSTS HTTPs Strict Transport Security
HTTPs Strict Transport Security
HTTPs Strict Transport Security
Gol D Roger
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
webhostingguy
Introduction to HTTP: TCP/IP and application layer protocols, URLs, resources and MIME Types, HTTP request/response cycle and proxies. Setup and deployment: Planning Web server & site deployments, Site structure and basic server configuration, Managing users and hosts.
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
Port80 Software
#DNS and #HTTP overview. #Client/Origin Request; #Request Methods; #Response Headers;#Web Application Components; Record Types; #Domain Name #Hierarchy; #Primary Servers; #Secondary #Servers;#TLD; #DNSdelegation; #TTL; #DNSzone;
DNS & HTTP overview
DNS & HTTP overview
Roman Wlodarski
Introduction A powerful tool for network troubleshooting but also a potential weakness from an Information Assurance perspective is the ability to communicate directly with an application simply by addressing its well-known port. Unless the protocol being used includes provision for access control or access is restricted externally to the protocol (using a firewall, for example) the remote client can obtain any service specified by the protocol. Two such applications which use human readable protocols are HTTP and SMTP. For this assignment you will use telnet to establish the direct port connection and emulate a client using each of these two protocols. Activities and Deliverables A. Emulating a Web Browser 1. Use Telnet to connect to Google or other commonly available Internet address via port 80. 2. Send an HTTP GET request for the default page. a. If you get a prompt for username and password that probably means you are not telnetting to port 80. 3. Include a copy of up to 25 lines of what is received back with your paper. 4. Answer the following questions in your submitted paper: a. What is the last modified date of the object received? b. What Web server process software is used by the host of the Web site? C. Discussion The protocols for both SMTP and HTTP have been designed as a structured syntactic dialogue, which makes programming and troubleshooting much easier because the protocols are both human- and machine-readable. Use of such a syntax has implications in the area of information assurance and this exercise is partially intended to make you aware of just how easy it is to take advantage of such a design. It is likewise arguable that making these protocols this "simple" is one of the reasons they have become widely adopted and fairly firmly entrenched from a practical viewpoint. D. Written Assignment Prepare a brief paper (suggested length of two to four pages) reporting on your activities in accomplishing these tasks and the level of difficulty you associate with them. Include in your paper a discussion of the plusses and minuses of this structured syntactic dialogue as a means of standardizing a protocol. How many of the negatives that you identify exist for any protocol standardization and not just for this approach? Include an analysis of the security and privacy implications of the "simple" nature of these protocols. What measures can be employed to mitigate the risks posed by the design? This part of your paper should be at least two or three paragraphs in length. Appendix 1: HTTP and Conditional GET Message Syntax Note that when using Telnet to connect to port 80, you must remember that HTTP was designed as a protocol for machine-to-machine communication. Because a carriage return by itself is interpreted as the end of a command stream and the connection is usually set up to close after executing one command stream, sending an extra return will usually terminate your Telnet session. Additionally, characters are.
IntroductionA powerful tool for network troubleshooting but also.docx
IntroductionA powerful tool for network troubleshooting but also.docx
mariuse18nolet
CSE422 Section 002 – Computer Networking Fall 2018 Homework 2 – 50 points Sockets (10 points) 1. For a client-server application over TCP, why must the server program be executed before the client program? 2. For a client-server application over UDP, why may the client program be executed before the server program? 3. The UDP server shown in the course slides needed only one socket, whereas the TCP server needed two sockets. Why? 4. If the TCP server were to support N simultaneous connections, each from a different client host, how may sockets would the TCP server need? 5. You are creating an event logging service that will be handling event messages from multiple remote clients. This service can suffer delays in message delivery and even the loss of some event messages. Would you implement this using TCP or UDP? Why? The HTTP GET message (10 Points) Consider the figure below, where a client is sending an HTTP GET message to a web server, gaia.cs.umass.edu. Suppose the client-to-server HTTP GET message is the following: GET /kurose_ross/interactive/quotation1.htm HTTP/1.1 Host: gaia.cs.umass.edu Accept: text/plain, text/html, image/gif, image/jpeg, audio/basic, audio/vnf.wave, video/mp4, video/wmv, application/*, */* Accept-Language: en-us, en-gb;q=0.5, en;q=0.1, fr, fr-ch, zh, cs If-Modified-Since: Wed, 10 Jan 2018 13:13:03 -0800 User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11 Answer the following questions: 1. What is the name of the file that is being retrieved in this GET message? 2. What version of HTTP is the client running? CSE422 Section 002 – Computer Networking Fall 2018 3. What formats of text, images, audio, and video does the client browser prefer to receive? [Note: for this and the following questions on browser media and language preferences, you will need to do a bit of additional reading on the Web. Here is a good place to start.] 4. What do the strings "application/*" and "*/*" signify in the Accept: header? 5. What languages is the browser indicating that it is willing to accept? [Note: you can look at your own browser preferences to get a listing of language codes.] 6. What is the meaning of the "relative quality factor," q, associated with the various version of English? [Note: Here is a good place to start. See also [RFC 2616].] 7. What is the client's preferred version of English? What is the browser's least preferred version of English? 8. Does the browser sending the HTTP message prefer Swiss French over traditional French? Explain. 9. Does the client already have a (possibly out-of-date) copy of the requested file? Explain. If so, approximately how long ago did the client receive the file, assuming the GET request has just been issued? 10. What is the type of client browser and the client's operating system? [Note: To answer this, you'll need to understan.
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
mydrynan
WWW for Mobile Apps
WWW for Mobile Apps
Reni Sagayaraj
RFC 7540 was ratified over 2 years ago and, today, all major browsers, servers, and CDNs support the next generation of HTTP. Just over a year ago, at Velocity (https://www.slideshare.net/Fastly/http2-what-no-one-is-telling-you), we discussed the protocol, looked at some real world implications of its deployment and use, and what realistic expectations we should have from its use. Now that adoption is ramped up and the protocol is being regularly used on the Internet, it's a good time to revisit the protocol and its deployment. Has it evolved? Have we learned anything? Are all the features providing the benefits we were expecting? What's next? In this session, we'll review protocol basics and try to answer some of these questions based on real-world use of it. We'll dig into the core features like interaction with TCP, server push, priorities and dependencies, and HPACK. We'll look at these features through the lens of experience and see if good practice patterns have emerged. We'll also review available tools and discuss what protocol enhancements are in the near and not-so-near horizon.
Revisiting HTTP/2
Revisiting HTTP/2
Fastly
a
Computer network (10)
Computer network (10)
NYversity
RESTful services
RESTful services
gouthamrv
Starting With Php
Starting With Php
Harit Kothari
Hypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
Web Server Administration
Web Server Administration
webhostingguy
Web Server Administration
Web Server Administration
webhostingguy
Web Server Administration
Web Server Administration
webhostingguy
What browser APIs can we use for data exchange. XMLHttpRequest, fetch(), Server-Sent Events, WebSocket, WebRTC. What's the difference. Use cases for each of those.
Browser APIs for data exchange: types and application
Browser APIs for data exchange: types and application
Pavel Klimiankou
https://www.youtube.com/watch?v=lKrbeJ7-J98 HTTP messages are how data is exchanged between a server and a client. There are two types of messages: requests sent by the client to trigger an action on the server, and responses, the answer from the server.
HTTP Request and Response Structure
HTTP Request and Response Structure
BhagyashreeGajera1
web development
Lecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptx
Kevi20
Presentation (PowerPoint File)
Presentation (PowerPoint File)
webhostingguy
Introduction to information and information transforms.
Itt1 intro knowing and doing
Itt1 intro knowing and doing
Morten Nielsen
Itt2 its pki and certificates
Itt2 its pki and certificates
Morten Nielsen
More Related Content
Similar to ITET1 Routing Application layer.odp
HTML/XHTML and HTTP Basics Review PHP and the Web Server Architecture Model Overview of PHP Capabilities CGI vs. Shared Object Model
PHP Training: Module 1
PHP Training: Module 1
hussulinux
HSTS HTTPs Strict Transport Security
HTTPs Strict Transport Security
HTTPs Strict Transport Security
Gol D Roger
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
webhostingguy
Introduction to HTTP: TCP/IP and application layer protocols, URLs, resources and MIME Types, HTTP request/response cycle and proxies. Setup and deployment: Planning Web server & site deployments, Site structure and basic server configuration, Managing users and hosts.
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
Port80 Software
#DNS and #HTTP overview. #Client/Origin Request; #Request Methods; #Response Headers;#Web Application Components; Record Types; #Domain Name #Hierarchy; #Primary Servers; #Secondary #Servers;#TLD; #DNSdelegation; #TTL; #DNSzone;
DNS & HTTP overview
DNS & HTTP overview
Roman Wlodarski
Introduction A powerful tool for network troubleshooting but also a potential weakness from an Information Assurance perspective is the ability to communicate directly with an application simply by addressing its well-known port. Unless the protocol being used includes provision for access control or access is restricted externally to the protocol (using a firewall, for example) the remote client can obtain any service specified by the protocol. Two such applications which use human readable protocols are HTTP and SMTP. For this assignment you will use telnet to establish the direct port connection and emulate a client using each of these two protocols. Activities and Deliverables A. Emulating a Web Browser 1. Use Telnet to connect to Google or other commonly available Internet address via port 80. 2. Send an HTTP GET request for the default page. a. If you get a prompt for username and password that probably means you are not telnetting to port 80. 3. Include a copy of up to 25 lines of what is received back with your paper. 4. Answer the following questions in your submitted paper: a. What is the last modified date of the object received? b. What Web server process software is used by the host of the Web site? C. Discussion The protocols for both SMTP and HTTP have been designed as a structured syntactic dialogue, which makes programming and troubleshooting much easier because the protocols are both human- and machine-readable. Use of such a syntax has implications in the area of information assurance and this exercise is partially intended to make you aware of just how easy it is to take advantage of such a design. It is likewise arguable that making these protocols this "simple" is one of the reasons they have become widely adopted and fairly firmly entrenched from a practical viewpoint. D. Written Assignment Prepare a brief paper (suggested length of two to four pages) reporting on your activities in accomplishing these tasks and the level of difficulty you associate with them. Include in your paper a discussion of the plusses and minuses of this structured syntactic dialogue as a means of standardizing a protocol. How many of the negatives that you identify exist for any protocol standardization and not just for this approach? Include an analysis of the security and privacy implications of the "simple" nature of these protocols. What measures can be employed to mitigate the risks posed by the design? This part of your paper should be at least two or three paragraphs in length. Appendix 1: HTTP and Conditional GET Message Syntax Note that when using Telnet to connect to port 80, you must remember that HTTP was designed as a protocol for machine-to-machine communication. Because a carriage return by itself is interpreted as the end of a command stream and the connection is usually set up to close after executing one command stream, sending an extra return will usually terminate your Telnet session. Additionally, characters are.
IntroductionA powerful tool for network troubleshooting but also.docx
IntroductionA powerful tool for network troubleshooting but also.docx
mariuse18nolet
CSE422 Section 002 – Computer Networking Fall 2018 Homework 2 – 50 points Sockets (10 points) 1. For a client-server application over TCP, why must the server program be executed before the client program? 2. For a client-server application over UDP, why may the client program be executed before the server program? 3. The UDP server shown in the course slides needed only one socket, whereas the TCP server needed two sockets. Why? 4. If the TCP server were to support N simultaneous connections, each from a different client host, how may sockets would the TCP server need? 5. You are creating an event logging service that will be handling event messages from multiple remote clients. This service can suffer delays in message delivery and even the loss of some event messages. Would you implement this using TCP or UDP? Why? The HTTP GET message (10 Points) Consider the figure below, where a client is sending an HTTP GET message to a web server, gaia.cs.umass.edu. Suppose the client-to-server HTTP GET message is the following: GET /kurose_ross/interactive/quotation1.htm HTTP/1.1 Host: gaia.cs.umass.edu Accept: text/plain, text/html, image/gif, image/jpeg, audio/basic, audio/vnf.wave, video/mp4, video/wmv, application/*, */* Accept-Language: en-us, en-gb;q=0.5, en;q=0.1, fr, fr-ch, zh, cs If-Modified-Since: Wed, 10 Jan 2018 13:13:03 -0800 User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11 Answer the following questions: 1. What is the name of the file that is being retrieved in this GET message? 2. What version of HTTP is the client running? CSE422 Section 002 – Computer Networking Fall 2018 3. What formats of text, images, audio, and video does the client browser prefer to receive? [Note: for this and the following questions on browser media and language preferences, you will need to do a bit of additional reading on the Web. Here is a good place to start.] 4. What do the strings "application/*" and "*/*" signify in the Accept: header? 5. What languages is the browser indicating that it is willing to accept? [Note: you can look at your own browser preferences to get a listing of language codes.] 6. What is the meaning of the "relative quality factor," q, associated with the various version of English? [Note: Here is a good place to start. See also [RFC 2616].] 7. What is the client's preferred version of English? What is the browser's least preferred version of English? 8. Does the browser sending the HTTP message prefer Swiss French over traditional French? Explain. 9. Does the client already have a (possibly out-of-date) copy of the requested file? Explain. If so, approximately how long ago did the client receive the file, assuming the GET request has just been issued? 10. What is the type of client browser and the client's operating system? [Note: To answer this, you'll need to understan.
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
mydrynan
WWW for Mobile Apps
WWW for Mobile Apps
Reni Sagayaraj
RFC 7540 was ratified over 2 years ago and, today, all major browsers, servers, and CDNs support the next generation of HTTP. Just over a year ago, at Velocity (https://www.slideshare.net/Fastly/http2-what-no-one-is-telling-you), we discussed the protocol, looked at some real world implications of its deployment and use, and what realistic expectations we should have from its use. Now that adoption is ramped up and the protocol is being regularly used on the Internet, it's a good time to revisit the protocol and its deployment. Has it evolved? Have we learned anything? Are all the features providing the benefits we were expecting? What's next? In this session, we'll review protocol basics and try to answer some of these questions based on real-world use of it. We'll dig into the core features like interaction with TCP, server push, priorities and dependencies, and HPACK. We'll look at these features through the lens of experience and see if good practice patterns have emerged. We'll also review available tools and discuss what protocol enhancements are in the near and not-so-near horizon.
Revisiting HTTP/2
Revisiting HTTP/2
Fastly
a
Computer network (10)
Computer network (10)
NYversity
RESTful services
RESTful services
gouthamrv
Starting With Php
Starting With Php
Harit Kothari
Hypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
Web Server Administration
Web Server Administration
webhostingguy
Web Server Administration
Web Server Administration
webhostingguy
Web Server Administration
Web Server Administration
webhostingguy
What browser APIs can we use for data exchange. XMLHttpRequest, fetch(), Server-Sent Events, WebSocket, WebRTC. What's the difference. Use cases for each of those.
Browser APIs for data exchange: types and application
Browser APIs for data exchange: types and application
Pavel Klimiankou
https://www.youtube.com/watch?v=lKrbeJ7-J98 HTTP messages are how data is exchanged between a server and a client. There are two types of messages: requests sent by the client to trigger an action on the server, and responses, the answer from the server.
HTTP Request and Response Structure
HTTP Request and Response Structure
BhagyashreeGajera1
web development
Lecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptx
Kevi20
Presentation (PowerPoint File)
Presentation (PowerPoint File)
webhostingguy
Similar to ITET1 Routing Application layer.odp
(20)
PHP Training: Module 1
PHP Training: Module 1
HTTPs Strict Transport Security
HTTPs Strict Transport Security
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
DNS & HTTP overview
DNS & HTTP overview
IntroductionA powerful tool for network troubleshooting but also.docx
IntroductionA powerful tool for network troubleshooting but also.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
WWW for Mobile Apps
WWW for Mobile Apps
Revisiting HTTP/2
Revisiting HTTP/2
Computer network (10)
Computer network (10)
RESTful services
RESTful services
Starting With Php
Starting With Php
Hypertext Transfer Protocol
Hypertext Transfer Protocol
Web Server Administration
Web Server Administration
Web Server Administration
Web Server Administration
Web Server Administration
Web Server Administration
Browser APIs for data exchange: types and application
Browser APIs for data exchange: types and application
HTTP Request and Response Structure
HTTP Request and Response Structure
Lecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptx
Presentation (PowerPoint File)
Presentation (PowerPoint File)
More from Morten Nielsen
Introduction to information and information transforms.
Itt1 intro knowing and doing
Itt1 intro knowing and doing
Morten Nielsen
Itt2 its pki and certificates
Itt2 its pki and certificates
Morten Nielsen
Itt2 its ssl and services
Itt2 its ssl and services
Morten Nielsen
Itt2 its ids
Itt2 its ids
Morten Nielsen
Itt2 its encrypted storage
Itt2 its encrypted storage
Morten Nielsen
Itt2 its introduction
Itt2 its introduction
Morten Nielsen
Itt2 its introduction
Itt2 its introduction
Morten Nielsen
Introducing virtual machines
Itt3 virtual machines
Itt3 virtual machines
Morten Nielsen
Stakeholders and requirements.
Itt1 sd requirements
Itt1 sd requirements
Morten Nielsen
Basic introduction to UML and object oriented thinking.
Itt1 sd uml and oo
Itt1 sd uml and oo
Morten Nielsen
Itt3 its acl
Itt3 its acl
Morten Nielsen
Itt3 its social engineering
Itt3 its social engineering
Morten Nielsen
Itet3 its forensics
Itet3 its forensics
Morten Nielsen
Diagram cookbook
Diagram cookbook
Morten Nielsen
ITET3 Networking P2P
ITET3 Networking P2P
Morten Nielsen
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
Morten Nielsen
ITET3 ITS governance
ITET3 ITS governance
Morten Nielsen
Routing vlans
Routing vlans
Morten Nielsen
Itet2 its social engineering
Itet2 its social engineering
Morten Nielsen
Itet2 its counter recon
Itet2 its counter recon
Morten Nielsen
More from Morten Nielsen
(20)
Itt1 intro knowing and doing
Itt1 intro knowing and doing
Itt2 its pki and certificates
Itt2 its pki and certificates
Itt2 its ssl and services
Itt2 its ssl and services
Itt2 its ids
Itt2 its ids
Itt2 its encrypted storage
Itt2 its encrypted storage
Itt2 its introduction
Itt2 its introduction
Itt2 its introduction
Itt2 its introduction
Itt3 virtual machines
Itt3 virtual machines
Itt1 sd requirements
Itt1 sd requirements
Itt1 sd uml and oo
Itt1 sd uml and oo
Itt3 its acl
Itt3 its acl
Itt3 its social engineering
Itt3 its social engineering
Itet3 its forensics
Itet3 its forensics
Diagram cookbook
Diagram cookbook
ITET3 Networking P2P
ITET3 Networking P2P
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
ITET3 ITS governance
ITET3 ITS governance
Routing vlans
Routing vlans
Itet2 its social engineering
Itet2 its social engineering
Itet2 its counter recon
Itet2 its counter recon
ITET1 Routing Application layer.odp
1.
Application layer
2.
3.
4.
Presentation
5.
Session
6.
Application achitechture Peer-to-peer
Client/server
7.
8.
SMTP
9.
10.
Streaming
11.
FTP
12.
13.
14.
15.
What is GET
and POST?
16.
Default port number
for HTTP?
17.
18.
400 Bad request
19.
301 Moved permanently
20.
And more. See
RFCs for details.
21.
22.
host: www.sde.dk
23.
24.
Why host?
25.
Possible solution Send
Received
26.
27.
Uses “If-modified-since” header
line
28.
29.
30.
31.
DNS
32.
DNS root servers
Root server geographically
33.
34.
dig dr.dk MX
35.
dig google.com
36.
dig @dns101.telia.com google.com
37.
And how does
this look in wireshark?
Download now