SlideShare a Scribd company logo

Networking Recap
Network Security Workshop

                            Dedi Dwianto, C|EH, OSCP
      Daftar ISI
Contents

 Review of networking basics

 OSI 7 layer models

 TCP/IP – Internet models

 Common network protocols
Review of networking basics




               Networking
Networking Components

 HUB

 SWITCH

 ROUTER

 HOST
Networking Components

 Network edge :
    Applications
    Hosts

 Network core :
    Routers
    Network of networks

 Access network, physical media :
    Communication links
The Network Core

 Mesh of interconnected routers
OSI 7 Layer Model
Physical Layer Vulnerabilities

 Loss of power

 Loss of environmental control

 Physical damage or destruction of data and hardware

 Unauthorized changes to the functional environment

 Disconnection of physical data links

 Undetectable interception of data
Data Link Layer Vulnerabilities

 MAC address spoofing

 VLAN circumvention

 Spanning tree errors
Network Layer Vulnerabilities

 Route spoofing - propagation of false network topology

 IP Address Spoofing- false source addressing on malicious
   packets

 Identity & Resource ID Vulnerability
Transport Layer Vulnerabilities

 Mishandling of undefined, poorly defined, or “illegal”
   conditions
 Differences in transport protocol implementation allow
   “fingerprinting’ and otherenumeration of host information
 Overloading of transport-layer mechanisms such as port
   numbers limit the abilityto effectively filter and qualify
   traffic.
 Transmission mechanisms can be subject to spoofing and
   attack based oncrafted packets.
Session Layer Vulnerabilities

 Weak or non-existent authentication mechanisms

 Session identification may be subject to spoofing and
   hijack

 Leakage of information based on failed authentication
   attempts

 Unlimited failed sessions allow brute-force attacks on
   access credentials
Presentation Layer Vulnerabilities

 Poor handling of unexpected input can lead to application
   crashes or surrender of control to execute arbitrary
   instructions.

 Unintentional or ill-advised use of externally supplied
   input in control contexts may allow remote manipulation
   or information leakage.

 Cryptographic flaws may be exploited to circumvent
   privacy protections .
Application Layer Vulnerabilities

 Open design issues allow free use of application resources
   by unintended parties

 Backdoors and application design flaws bypass standard
   security controls

 Inadequate security controls force “all-or-nothing”
   approach, resulting in either excessive or insufficient
   access.
TCP/IP – Model
TCP Header
UDP Header
IP Header
TCP/IP Tunneling
Connection-oriented service

 TCP – Transmission Control Protocol

 TCP Service [ RFC 793 ]
    Reliable, in-order byte stream data transfer
    Flow control
    Congestion control
Connection-oriented service

 TCP handshaking :
    Setup (prepare for) data transfer ahead of time
Connection-oriented service

 TCP – Transmission Control Protocol

 TCP Service [ RFC 793 ]
    Reliable, in-order byte stream data transfer
    Flow control
    Congestion control
Connectionless

 UDP – User Datagram Protocol

 UDP Service [ RFC 768 ]
    Unreliable data transfer
    No flow control
    No congestion control
Internet

 Internet “millions of connected computing devices :
   hosts, end-system”

 Internet “ network of networks”

 Internet standard :
    RFC : Request for comments
    IETF : Internet Engineering Task Force
Common Network Protocol

 Protocols – control sending, receiving of messages
    Example :
        TCP
        IP
        HTTP
        FTP
        PPP
Application Layer Protocols

 Application : communicating, distributed processes

 Application-layer protocols :
    One “piece” of an application
    Define messages exchanged by applications and action
     taken
    Use communication services provided by lower layer (TCP,
     UDP)
    Types of messages exchanged
Application Layer Protocols

 Public domain protocols :
     Defined in RFCs
     Allows for interoperability
     Example : HTTP, SMTP

   Proprietary protocols :
     Skype
     MS Exchange
     VTP
Network Application

 Typical network application has two pieces : client and
   server

 Client :
    Initiates contact with server
    Typically request services from server
    Web : client implemented in browser
    Email : in mail reader
Network Application

 Server:
    Provides requested service to client
    Example :
       Web server send requested web page
Internet Apps : application, transport
                                       protocols

Application              App Layer Protocol   Transport Protocol
Email                    SMTP [RFC 2821]      TCP
Remote Terminal Access   Telnet [RFC 854]     TCP
Web                      HTTP [RFC 2616]      TCP
File transfer            FTP [RFC 959]        TCP
Streaming multimedia     Proprietary          TCP and UDP

More Related Content

What's hot

Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
Ip address
Ip addressIp address
Ip address
Robin Sedeqi
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
Manoj Kumar
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
HTTP & HTTPS
HTTP & HTTPSHTTP & HTTPS
HTTP & HTTPS
NetProtocol Xpert
 
SSL
SSLSSL
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
ISMT College
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Ram Dutt Shukla
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
Real Estate
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SAMeh Zaghloul
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
CEC Landran
 
An Introduction to OMNeT++ 5.1
An Introduction to OMNeT++ 5.1An Introduction to OMNeT++ 5.1
An Introduction to OMNeT++ 5.1
Alpen-Adria-Universität
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Naveen Kumar R.B.
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 

What's hot (20)

Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Ip address
Ip addressIp address
Ip address
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
HTTP & HTTPS
HTTP & HTTPSHTTP & HTTPS
HTTP & HTTPS
 
SSL
SSLSSL
SSL
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
An Introduction to OMNeT++ 5.1
An Introduction to OMNeT++ 5.1An Introduction to OMNeT++ 5.1
An Introduction to OMNeT++ 5.1
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Web security
Web securityWeb security
Web security
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 

Similar to Networking recap

Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
syedhaiderraza
 
App layer
App layerApp layer
App layer
khushali_modi
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
chameli devi group of institutions
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
nguyễn cầm
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
MiftaNurFarid2
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
Sarah R. Dowlath
 
ip-basics.ppt
ip-basics.pptip-basics.ppt
ip-basics.ppt
GioSanBuenaventura1
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
lolo749806
 
Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]
LeelaRam Tenneti
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Mukesh Gautam
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
syedhaiderraza
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
HNDE Labuduwa Galle
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.ppt
Kristopher Hefner
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
hz3012
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
milon24
 
Week2 lec1-bscs1
Week2 lec1-bscs1Week2 lec1-bscs1
Week2 lec1-bscs1
syedhaiderraza
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
Orbay Yeşil
 

Similar to Networking recap (20)

Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 
App layer
App layerApp layer
App layer
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
ip-basics.ppt
ip-basics.pptip-basics.ppt
ip-basics.ppt
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
 
Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]Chapter1 sept 8_05[one.]
Chapter1 sept 8_05[one.]
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.ppt
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
 
Week2 lec1-bscs1
Week2 lec1-bscs1Week2 lec1-bscs1
Week2 lec1-bscs1
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 

More from Dedi Dwianto

Application Security Trends and Issues
Application Security Trends and IssuesApplication Security Trends and Issues
Application Security Trends and Issues
Dedi Dwianto
 
Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015
Dedi Dwianto
 
Security Awareness
Security Awareness Security Awareness
Security Awareness
Dedi Dwianto
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
Dedi Dwianto
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
Dedi Dwianto
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
Dedi Dwianto
 
what is security
what is securitywhat is security
what is security
Dedi Dwianto
 

More from Dedi Dwianto (7)

Application Security Trends and Issues
Application Security Trends and IssuesApplication Security Trends and Issues
Application Security Trends and Issues
 
Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015
 
Security Awareness
Security Awareness Security Awareness
Security Awareness
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
what is security
what is securitywhat is security
what is security
 

Networking recap

  • 1.  Networking Recap Network Security Workshop Dedi Dwianto, C|EH, OSCP Daftar ISI
  • 2. Contents  Review of networking basics  OSI 7 layer models  TCP/IP – Internet models  Common network protocols
  • 3. Review of networking basics Networking
  • 4. Networking Components  HUB  SWITCH  ROUTER  HOST
  • 5. Networking Components  Network edge :  Applications  Hosts  Network core :  Routers  Network of networks  Access network, physical media :  Communication links
  • 6. The Network Core  Mesh of interconnected routers
  • 7. OSI 7 Layer Model
  • 8. Physical Layer Vulnerabilities  Loss of power  Loss of environmental control  Physical damage or destruction of data and hardware  Unauthorized changes to the functional environment  Disconnection of physical data links  Undetectable interception of data
  • 9. Data Link Layer Vulnerabilities  MAC address spoofing  VLAN circumvention  Spanning tree errors
  • 10. Network Layer Vulnerabilities  Route spoofing - propagation of false network topology  IP Address Spoofing- false source addressing on malicious packets  Identity & Resource ID Vulnerability
  • 11. Transport Layer Vulnerabilities  Mishandling of undefined, poorly defined, or “illegal” conditions  Differences in transport protocol implementation allow “fingerprinting’ and otherenumeration of host information  Overloading of transport-layer mechanisms such as port numbers limit the abilityto effectively filter and qualify traffic.  Transmission mechanisms can be subject to spoofing and attack based oncrafted packets.
  • 12. Session Layer Vulnerabilities  Weak or non-existent authentication mechanisms  Session identification may be subject to spoofing and hijack  Leakage of information based on failed authentication attempts  Unlimited failed sessions allow brute-force attacks on access credentials
  • 13. Presentation Layer Vulnerabilities  Poor handling of unexpected input can lead to application crashes or surrender of control to execute arbitrary instructions.  Unintentional or ill-advised use of externally supplied input in control contexts may allow remote manipulation or information leakage.  Cryptographic flaws may be exploited to circumvent privacy protections .
  • 14. Application Layer Vulnerabilities  Open design issues allow free use of application resources by unintended parties  Backdoors and application design flaws bypass standard security controls  Inadequate security controls force “all-or-nothing” approach, resulting in either excessive or insufficient access.
  • 20. Connection-oriented service  TCP – Transmission Control Protocol  TCP Service [ RFC 793 ]  Reliable, in-order byte stream data transfer  Flow control  Congestion control
  • 21. Connection-oriented service  TCP handshaking :  Setup (prepare for) data transfer ahead of time
  • 22. Connection-oriented service  TCP – Transmission Control Protocol  TCP Service [ RFC 793 ]  Reliable, in-order byte stream data transfer  Flow control  Congestion control
  • 23. Connectionless  UDP – User Datagram Protocol  UDP Service [ RFC 768 ]  Unreliable data transfer  No flow control  No congestion control
  • 24. Internet  Internet “millions of connected computing devices : hosts, end-system”  Internet “ network of networks”  Internet standard :  RFC : Request for comments  IETF : Internet Engineering Task Force
  • 25. Common Network Protocol  Protocols – control sending, receiving of messages  Example :  TCP  IP  HTTP  FTP  PPP
  • 26. Application Layer Protocols  Application : communicating, distributed processes  Application-layer protocols :  One “piece” of an application  Define messages exchanged by applications and action taken  Use communication services provided by lower layer (TCP, UDP)  Types of messages exchanged
  • 27. Application Layer Protocols  Public domain protocols :  Defined in RFCs  Allows for interoperability  Example : HTTP, SMTP  Proprietary protocols :  Skype  MS Exchange  VTP
  • 28. Network Application  Typical network application has two pieces : client and server  Client :  Initiates contact with server  Typically request services from server  Web : client implemented in browser  Email : in mail reader
  • 29. Network Application  Server:  Provides requested service to client  Example :  Web server send requested web page
  • 30. Internet Apps : application, transport protocols Application App Layer Protocol Transport Protocol Email SMTP [RFC 2821] TCP Remote Terminal Access Telnet [RFC 854] TCP Web HTTP [RFC 2616] TCP File transfer FTP [RFC 959] TCP Streaming multimedia Proprietary TCP and UDP