This document provides an overview of common TCP/IP tools including the command prompt, ipconfig, ping, and tracert. It also covers advanced TCP/IP tools such as netstat, nbtstat, pathping, nslookup, netsh, route, net, and telnet. The objectives are to understand basic and advanced TCP/IP commands and their functionality in displaying network configuration, testing connectivity, tracing network paths, and troubleshooting. Additional resources like books, courses, and exams are listed to further learning.
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands.
The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) product based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, the term "Wi-Fi" is used in general English as a synonym for "WLAN" since most modern WLANs are based on these standards. "Wi-Fi" is a trademark of the Wi-Fi Alliance. The "Wi-Fi Certified" trademark can only be used by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing.
Many devices can use Wi-Fi, e.g. personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. These can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points.
Depiction of a device sending information wirelessly to another device, both connected to the local network, in order to print a document.
Wi-Fi can be less secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical connection. Web pages that use TLS are secure, but unencrypted internet access can easily be detected by intruders. Because of this, Wi-Fi has adopted various encryption technologies. The early encryption WEP proved easy to break. Higher quality protocols (WPA, WPA2) were added later. An optional feature added in 2007, called Wi-Fi Protected Setup (WPS), had a serious flaw that allowed an attacker to recover the router's password.[2] The Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly certified devices resist attacks .
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
4. • The Windows command prompt is Microsoft’s version of a command-line
interface or CLI
• Running the command prompt as an Administrator is also known as
running it in elevated mode
• Tools can be run using the command prompt
Command Prompt
5. • Displays the current configuration of the installed IP stack on a
networked computer using TCP/IP
• The /all switch can be used to view additional details about each
adapter
• Can be used to refresh Dynamic Host Configuration Protocol (DHCP)
and Domain Name System (DNS) settings
ipconfig
6. • Verifies IP-level connectivity to another TCP/IP device by sending
Internet Control Message Protocol (ICMP) Echo Request messages
• A number of switches can accommodate different testing scenarios
• Can be used to test IPv4 and IPv6 connectivity
ping
Hey, are you awake?
Why yes, yes I am...
7. • Determines the path taken to a destination by sending Internet Control
Message Protocol (ICMP) Echo Request messages to the destination
with incrementally increasing Time to Live (TTL) field values
• Used to “trace” a network path from sending to receiving device
• Useful if the local device is testing ok but connectivity can’t be
established
tracert
Hey, how do I get
there?
First you go
through me...
Second you go
through me...
Then you re here!
9. • Displays active TCP connections, ports on which the computer is
listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP,
ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6,
TCP over IPv6, and UDP over IPv6 protocols)
• Used without parameters, netstat displays active TCP connections
Netstat
10. • Displays NetBIOS over TCP/IP (NetBT) protocol statistics for local and
remote computers, NetBIOS name tables for both the local computer
and remote computers, and the NetBIOS name cache
• NetBIOS was developed in the 1980s to allow applications to
communicate over a network using the session layer of the OSI model
• NetBIOS establishes logical names on the network, establishes sessions
between two logical names on the network, and supports reliable data
transfer between computers that have established a session
• NetBIOS over TCP/IP sends the NetBIOS protocol within TCP and UDP
sessions
NbtStat
11. • A command-line route tracing tool that combines features of the tools
Ping and TraceRt that includes additional information
• PathPing sends packets to each router on the way to a final destination
over a period of time, and then computes results based on the packets
returned from each hop
• PathPing can show the degree of packet loss at any specified router or
link enabling you to pinpoint links that might be causing network
problems
PathPing
12. • Displays information that you can use to diagnose Domain Name
System (DNS)
• The Nslookup command-line tool is available only if you have
installed the TCP/IP protocol
• You should be familiar with DNS before using this tool
Nslookup
13. • A command-line scripting utility that enables you to display or
modify the network configuration of a computer currently
running
• Command works on local or remote computers
• Provides a scripting feature that allows you to run a group of
commands in batch mode against a specified computer
• Enables you to save a configuration script in a text file for
archival purposes or to help you configure other servers
Netsh
14. • Displays and modifies the entries in the local IP routing table
• The Route Print command can be used to display routing table for a
Windows machine
This command gives the same result as netstat –r, but it is more commonly used
• The Route command can also be used to add and delete static routes
Route
15. • Many services use networking commands that begin with the
word net
• Although not specifically part of the TCP/IP command set, the net
command can display various important networking data, and it
enables you to configure various networking options such as services
Net
16. • The telnet commands enables you to communicate with a remote
computer that is using the Telnet protocol
• You can run telnet without parameters in order to enter the telnet context,
indicated by the Telnet prompt (telnet>)
• From the Telnet prompt, use the following commands to manage a
computer running Telnet Client
• A network administrator can connect to a remote computer, server, router,
or switch by typing telnet [IPAddress].
• Telnet is an older, out-of-date protocol, and as such, it should be replaced
with a more secure program such as SSH.
• It can also be used for troubleshooting by adding a port number
• telnet server01 25
Telnet
17. • You have learned basic TCP/IP commands and their functionality.
• You have learned how to use advanced TCP/IP commands.
Summary
18. Additional Resources & Next Steps
Books
• Exam 98-366: MTA
Networking
Fundamentals (Microsoft
Official Academic
Course)
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
366
Exams &
Certifications
• Exam 98-366:
Networking
Fundamentals