SlideShare a Scribd company logo
Friendly Tip: Please take notes to better remember concepts
In this video we will
learn about
Commands used in
Assessing Network
layout & Security
Core Cyber Security Concepts
Network Reconnaissance Tools
Network reconnaissance is a term for testing for potential
vulnerabilities in a computer network.
Network reconnaissance tools are used to scan the network
to probe for open ports and other vulnerabilities that can be
taken advantage of to gain access to the network.
What is Organizational
Security assessment?
Organizational security assessment is the process of
testing & analyzing an organization's security policy
and security controls in place to determine how
secure the organization is from Cyber Attacks.
" The first step of performing security
assessment is to identify the network
layout. It is vital to understand the
network architecture and the
security controls in place "
Network
Layout
Detection
To understand & see the network layout we can use the following
commands with respect to the operating system.
In computers running windows OS we can use the code ipconfig in
command prompt to view the device's IP address and Subnet
mask.
Similarly In computers
operating on Linux OS, we
can use the code ifconfig
in terminal to view the
network layout.
ipconfig/ifconfig command
Ping
command
Ping command is
used to test the
connectivity/ reach-
ability between
devices. It is used to
test/verify the
connection b/w the
host and the target
machine.
How does ping command work?
The ping command operates by sending/pinging Internet Control
Message Protocol (ICMP) Echo Request messages to the destination
computer and waits for a response., to hear back from the target
computer. The two major pieces of information that the ping command
provides are how many ICMP echo responses are returned and how
long it took for them to return.
For example, you might find no responses when pinging a network
printer, only to find out that the printer is offline and its cable needs
replaced. Or maybe you need to ping a router to verify that your
computer can connect to it to, so you don't have to worry about a
potential networking issue
-> ping command options
-> ping command example
C:Userslearningwithray>www.google.com
In this example, the
ping command is used
to ping the target
google.com
By default 4 ICMP
requests are sent to
www.google.com and
in this case we heard
back from all the
requests and the time
it took to hear back
from the target is
mentioned below
route command
In computing, route is a command used to view and manipulate the IP
routing table in Unix-like and Microsoft Windows operating systems.
trace route command
The Traceroute command (tracert on Windows) is a small network
diagnostic software that you have built-in on your device and
servers for tracing the route, hop by hop to a target.To access the
traceroute, you will need to use the Terminal (Linux and macOS) or
the Command Prompt
You can use the Traceroute and see the full route that the packets take
to their destination (domain or IP address). Apart from that, you will see
the hostnames and IPs of the routers on the way and the latency, the
time it takes for each device to receive and resend the data.
With trace route command You will be able to see all the routers on
the way, with their IP addresses and the time it took. You can better
understand the network and check if you can reach target device.
You can see how much
time it took in each
hop. So you can see a
spot that significantly
slows your network.
You can fix the
problem or add more
presence in the area.
ARP protocol in short is a procedure that connects an ever-changing
Internet Protocol (IP) address to a fixed/permament physical
machine address, known as a media access control (MAC) address,
in a local-area network (LAN).
Address Resolution Protocol
To put it simply, what happens is , in a LAN connection there are
devices with different IP addresses and MAC addresses. The router
allots the dynamic/ever changing IP addresses to the connected
devices mac addresses. Within the LAN, each device forwards its
data request to the router and router fetches the results.
But the problem is, even after fetching the results how is the router
supposed to know how and who to send the data packets without a
means of identifying who/what device requested for which info.
ARP protocol addresses this issue. The router forwards an internet
request, put forward by the connected devices and fetches the
requests from the internet.
After receiving all the information requests, the router
broadcasts/asks the ARP program to find a MAC address that
matches the destination IP address, where the network traffic is
supposed to go to.
After the request is made by the router within the LAN,
asking/inquiring who has the particular dynamic IP address linked to
their MAC address, and the device with the requested/matching IP
address steps forward, claiming it has the MAC address that
matches the destination IP address.
Only then the router transfers the data requested by the device.
ARP broadcasts a request packet to all the machines on the LAN and
asks if any of the machines are using that particular IP address.
When a machine recognizes the IP address as its own, it sends a
reply to the broadcast, so ARP can update the cache for future
reference and proceed with the communication i.e transfer data
packets/network traffic.
To sum it up :
A table called the ARP cache maintains a record of each IP address
and its corresponding MAC address.
ARP Table is used to keep the record of the IP address and MAC
address of the devices (source and destination device). For the
communication between two devices, it is necessary that the IP
address and the MAC address of the source and the destination
device should be stored in an ARP table.
If there is no record in the table, an ARP broadcast is sent by the
source to all the devices in a network. All the devices compare their
own IP address with the IP address of the destination device. When
the IP address of the device matches with each other, that device
sent the response, which is then updated in an ARP table.
Sources:
https://www.lifewire.com/ping-command-2618099
https://www.fortinet.com/resources/cyberglossary/what-is-arp
https://www.techtarget.com/searchnetworking/definition/Addre
ss-Resolution-Protocol-ARP
https://www.javatpoint.com/arp-table
https://www.geeksforgeeks.org/route-command-in-linux-with-
examples/
https://www.cloudns.net/blog/traceroute-command-tracert/

More Related Content

Similar to Commands used in Assessing Network layout & Security

Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
IPv4Mall
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
nautami
 
Mcse question
Mcse questionMcse question
111
111111
111
gadoosh
 
111
111111
111
gadoosh
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
habtex1230
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
Giuliano Tavaroli
 
Itep
ItepItep
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
Marvin Bronoso
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
Amit Kumar
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
Networking question
Networking questionNetworking question
Networking question
DEVBEJ
 
Understanding_Network_Devices.pptx
Understanding_Network_Devices.pptxUnderstanding_Network_Devices.pptx
Understanding_Network_Devices.pptx
meynard samson
 
internet working process DF.pdf
internet working process DF.pdfinternet working process DF.pdf
internet working process DF.pdf
inoviseo
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
Pragya Rastogi
 
Linux Commands
Linux CommandsLinux Commands
Linux Commands
lucita cabral
 
Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
ssuser39789f
 

Similar to Commands used in Assessing Network layout & Security (20)

Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 
Mcse question
Mcse questionMcse question
Mcse question
 
111
111111
111
 
111
111111
111
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
Itep
ItepItep
Itep
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
Networking question
Networking questionNetworking question
Networking question
 
Understanding_Network_Devices.pptx
Understanding_Network_Devices.pptxUnderstanding_Network_Devices.pptx
Understanding_Network_Devices.pptx
 
internet working process DF.pdf
internet working process DF.pdfinternet working process DF.pdf
internet working process DF.pdf
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Linux Commands
Linux CommandsLinux Commands
Linux Commands
 
Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 

More from LearningwithRayYT

Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
LearningwithRayYT
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
LearningwithRayYT
 
Identity Management Controls.pdf
Identity Management Controls.pdfIdentity Management Controls.pdf
Identity Management Controls.pdf
LearningwithRayYT
 
Security concerns regarding Vulnerabilities
Security concerns regarding VulnerabilitiesSecurity concerns regarding Vulnerabilities
Security concerns regarding Vulnerabilities
LearningwithRayYT
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
LearningwithRayYT
 
Implementing Account Policies & Authorization Solutions
Implementing Account Policies & Authorization SolutionsImplementing Account Policies & Authorization Solutions
Implementing Account Policies & Authorization Solutions
LearningwithRayYT
 
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposuresVulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposures
LearningwithRayYT
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
LearningwithRayYT
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer Attacks
LearningwithRayYT
 
Malware and Types of malwares.pdf
Malware and Types of malwares.pdfMalware and Types of malwares.pdf
Malware and Types of malwares.pdf
LearningwithRayYT
 

More from LearningwithRayYT (11)

Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
 
Identity Management Controls.pdf
Identity Management Controls.pdfIdentity Management Controls.pdf
Identity Management Controls.pdf
 
Security concerns regarding Vulnerabilities
Security concerns regarding VulnerabilitiesSecurity concerns regarding Vulnerabilities
Security concerns regarding Vulnerabilities
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Implementing Account Policies & Authorization Solutions
Implementing Account Policies & Authorization SolutionsImplementing Account Policies & Authorization Solutions
Implementing Account Policies & Authorization Solutions
 
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposuresVulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposures
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer Attacks
 
Malware and Types of malwares.pdf
Malware and Types of malwares.pdfMalware and Types of malwares.pdf
Malware and Types of malwares.pdf
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 

Commands used in Assessing Network layout & Security

  • 1. Friendly Tip: Please take notes to better remember concepts In this video we will learn about Commands used in Assessing Network layout & Security Core Cyber Security Concepts
  • 2. Network Reconnaissance Tools Network reconnaissance is a term for testing for potential vulnerabilities in a computer network. Network reconnaissance tools are used to scan the network to probe for open ports and other vulnerabilities that can be taken advantage of to gain access to the network.
  • 3. What is Organizational Security assessment? Organizational security assessment is the process of testing & analyzing an organization's security policy and security controls in place to determine how secure the organization is from Cyber Attacks.
  • 4. " The first step of performing security assessment is to identify the network layout. It is vital to understand the network architecture and the security controls in place " Network Layout Detection
  • 5. To understand & see the network layout we can use the following commands with respect to the operating system. In computers running windows OS we can use the code ipconfig in command prompt to view the device's IP address and Subnet mask. Similarly In computers operating on Linux OS, we can use the code ifconfig in terminal to view the network layout. ipconfig/ifconfig command
  • 6. Ping command Ping command is used to test the connectivity/ reach- ability between devices. It is used to test/verify the connection b/w the host and the target machine.
  • 7. How does ping command work? The ping command operates by sending/pinging Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waits for a response., to hear back from the target computer. The two major pieces of information that the ping command provides are how many ICMP echo responses are returned and how long it took for them to return. For example, you might find no responses when pinging a network printer, only to find out that the printer is offline and its cable needs replaced. Or maybe you need to ping a router to verify that your computer can connect to it to, so you don't have to worry about a potential networking issue
  • 8. -> ping command options
  • 9. -> ping command example C:Userslearningwithray>www.google.com In this example, the ping command is used to ping the target google.com By default 4 ICMP requests are sent to www.google.com and in this case we heard back from all the requests and the time it took to hear back from the target is mentioned below
  • 10. route command In computing, route is a command used to view and manipulate the IP routing table in Unix-like and Microsoft Windows operating systems.
  • 11. trace route command The Traceroute command (tracert on Windows) is a small network diagnostic software that you have built-in on your device and servers for tracing the route, hop by hop to a target.To access the traceroute, you will need to use the Terminal (Linux and macOS) or the Command Prompt You can use the Traceroute and see the full route that the packets take to their destination (domain or IP address). Apart from that, you will see the hostnames and IPs of the routers on the way and the latency, the time it takes for each device to receive and resend the data.
  • 12. With trace route command You will be able to see all the routers on the way, with their IP addresses and the time it took. You can better understand the network and check if you can reach target device. You can see how much time it took in each hop. So you can see a spot that significantly slows your network. You can fix the problem or add more presence in the area.
  • 13. ARP protocol in short is a procedure that connects an ever-changing Internet Protocol (IP) address to a fixed/permament physical machine address, known as a media access control (MAC) address, in a local-area network (LAN). Address Resolution Protocol To put it simply, what happens is , in a LAN connection there are devices with different IP addresses and MAC addresses. The router allots the dynamic/ever changing IP addresses to the connected devices mac addresses. Within the LAN, each device forwards its data request to the router and router fetches the results.
  • 14. But the problem is, even after fetching the results how is the router supposed to know how and who to send the data packets without a means of identifying who/what device requested for which info. ARP protocol addresses this issue. The router forwards an internet request, put forward by the connected devices and fetches the requests from the internet.
  • 15. After receiving all the information requests, the router broadcasts/asks the ARP program to find a MAC address that matches the destination IP address, where the network traffic is supposed to go to. After the request is made by the router within the LAN, asking/inquiring who has the particular dynamic IP address linked to their MAC address, and the device with the requested/matching IP address steps forward, claiming it has the MAC address that matches the destination IP address. Only then the router transfers the data requested by the device.
  • 16. ARP broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using that particular IP address. When a machine recognizes the IP address as its own, it sends a reply to the broadcast, so ARP can update the cache for future reference and proceed with the communication i.e transfer data packets/network traffic. To sum it up : A table called the ARP cache maintains a record of each IP address and its corresponding MAC address.
  • 17. ARP Table is used to keep the record of the IP address and MAC address of the devices (source and destination device). For the communication between two devices, it is necessary that the IP address and the MAC address of the source and the destination device should be stored in an ARP table. If there is no record in the table, an ARP broadcast is sent by the source to all the devices in a network. All the devices compare their own IP address with the IP address of the destination device. When the IP address of the device matches with each other, that device sent the response, which is then updated in an ARP table.