SlideShare a Scribd company logo
MD SAQUIB NASIR KHAN
DIGITAL EVIDENCE ANALYST
DATA64 | CIALFOR
NETWORKING FUNDAMENTAL
Contain
 HUB, Switch, Router
 MAC
 IP
 Packet Forwarding
 Internet Protection
 WLAN
 Packet switching And Circuit switching
 DNS
 IDS & IPS
 VPN
www.malc0de.org
HUB VS Switch VS Router
www.malc0de.org
HUB
 No real understanding about transmit data
between system
 Only Broadcast packets
 Number of system increase speed will
decrease
www.malc0de.org
Switch
 Switch Does not broadcast Packets its share
the packet with the system for whom packets
was sent
 Does not consume Speed like HUB for packet
Sharing
www.malc0de.org
Router
 Router deals with broadcasting as well as
Individual Message deliver
 Act As firewall
 APR table
www.malc0de.org
MAC
 Media Access Control
 Only for Network Adapter
 Depends on ARP to communicate with others
 Ipconfig/ifconfig
 arp -a
www.malc0de.org
IP
 Unique Address given to MAC address
124. 224. 224.100
01111100 11100000 11100000 01100100
www.malc0de.org
Classes OF IP
 Class Range
 A 1-126 /8
 B 127-191 /16
 C 192-223 /24
 D 224-239 Multicast
 E 240-255 Experimental
 0 & 127
General Use
www.malc0de.org
Classes of Private IP
 Class Range
 A /8 10.0.0.0-10.255.255.255
 B /12 172.16.0.0-172.31.255.255
 C /16 192.168.0.0-192.168.255.255
www.malc0de.org
IP (INTERNET PROTOCOL
)
www.malc0de.org
Network & Host Address
 Class N/w + Host
 A N+H+H+H
 B N+N+H+H
 C N+N+N+H
www.malc0de.org
Class Less Inter Domain
Routing
 128,64,32,16,8,4,2,1
--------.--------.--------.--------
CIDR/28
28 ON 4 OFF
SUBNET FOR 100 SYSTEM?
300 subnet host number?
www.malc0de.org
192.168.100.97/27
 Find host address, network address, number
of host gateways and broadcast address.
www.malc0de.org
192.168.100.97/27
 X.X.X.11100000
 1110000> INCREMENT
NUMBER(32{128,64,32})
 X.X.X.32
 X.X.X.64
 X.X.X.96
 SUBNET :96
 Host: 00000 :31(16+8+4+2+1)
Broadcast : 96+31=127
Range: 97-126
www.malc0de.org
Type of IP Address
 Static address
 Dynamic address
 Public
 Private
www.malc0de.org
DHCP VS BOOTP
 Class A - large organizations , governments
 Class B - medium sized organizations
 Class C - small organizations
www.malc0de.org
Networking Mode
 Network Address Translation or NAT
 Bridge Mode
www.malc0de.org
APPLICATION
• HTTP, SMTP
• FTP, DNS, TELNET
TRANSPORT
• TCP
• UDP
NETWORK
• IP, ARP
• ICMP, IGMP
HOST-TO-
NETWORK
• ETHERNET
• TOKEN RING
TCP/IP
www.malc0de.org
Packet forwarding
 It is a process that is by default enable in
router. The router will perform packet
forwarding only if route is available in the
routing table.
www.malc0de.org
Metric of Dynamic Routing
 Hop Count
 Band Width
 Load
 Reliability
 Delay
 MTU
www.malc0de.org
Internet Protection
 Internet Key Exchange (IKE or IKEv2)
 Internet Protocol Security (IPsec)
 Kerberos
 Point-to-Point Protocol (PPP)
 Transport Layer Security (TLS)
 Secure Sockets Layer (SSL),
www.malc0de.org
WLAN
 A wireless LAN or WLAN is a wireless local
area network that uses radio waves as its
carrier.
 The last link with the users is wireless, to give
a network connection to all users in a building
or campus.
 The backbone network usually uses cables
www.malc0de.org
1. WEP (Wired Equivalency Privacy/ Wireless Encryption Protocol)
2. WPA (Wi-Fi Protected Access)
3. WPA 2 (Wi-Fi Protected Access 2)
WIRELESS NETWORKING
www.malc0de.org
WEP ( RC4 40bits to 128bits)
 Wired Equivalent Privacy (WEP) – A protocol to protect
link-level data during wireless transmission between
clients and access points.
 Services:
 Authentication: provides access control to the network by
denying access to client stations that fail to authenticate
properly.
 Confidentiality: intends to prevent information compromise
from casual eavesdropping
 Integrity: prevents messages from being modified while in
transit between the wireless client and the access point
www.malc0de.org
Authentication
CRC (Cyclic Redundant Check) www.malc0de.org
WPA
 48 bit IV
 128 Bit key
 TKIP (Temporal Key Integrity Protocol )
 A Message Integrity Code (MIC) called Michael
www.malc0de.org
WAP 2
 Uses the Advanced Encryption Standard
(AES)
 Symmetric-key block cipher using 128-bit keys.
 Generates CCM Protocol (CCMP):
 CCMP = CTR + CBC + MAC
 CTR = Counter Mode Encryption
 CBC/MAC = Cipher Block Chaining/Message
Authentication Code
www.malc0de.org
Protocol Release
date Op. Frequency
Data rate
(Max)
Range
(indoor)
Range
(outdoor)
Legacy 1997 2.5~2.5 GHz 2 Mbit/s
802.11a 1999
5.15~5.35/5.47~5.72
5/5.725~5.875 GHz
54 Mbit/s ~25 m ~75 m
802.11b 1999 2.4~2.5GHz 11 Mbit/s ~35 m ~100 m
802.11g 2003 2.4~2.5GHz 54 Mbit/s ~25 m ~75 m
802.11n 2007 2.4GHz or 5GHz 540 Mbit/s ~50 m ~125 m
802.11
802.11 802.11a 802.11b 802.11g 802.11n
802.11 Wireless LAN Working
Group
www.malc0de.org
Packet Switching Vs Circuit
Switching
www.malc0de.org
DOMAIN NAME SYSTEM
 DNS is directory Service.
 Provides Name to IP address
 Maps IP to Domain name and reverse
 DNS runs on port 53
 Runs on UDP
 A –Address record name to 32 bit address
 AAAA – Address Record name to 128 bit IPV6
address

www.malc0de.org
DNS Caching
www.malc0de.org
www.malc0de.org
DNS Cache Poisoning Attack
 Exploit DNS poisoning attack
 Change IP addresses to redirect URLs to fraudulent sites
 Potentially more dangerous than phishing attacks
 No email solicitation is required
 DNS poisoning attacks have occurred:
 January 2005, the domain name for a large New York ISP, Panix,
was hijacked to a site in Australia.
 In November 2004, Google and Amazon users were sent to Med
Network Inc., an online pharmacy
 In March 2003, a group dubbed the "Freedom Cyber Force Militia"
hijacked visitors to the Al-Jazeera Web site and presented them
with the message "God Bless Our Troops"
DNS Spoofing Tools
 Dsniff
 dnsspoof
 Example
 abc.com IP address is 10.0.0.1
 Make it spoof to respond 100.0.1.1
 In the text file dnssniff.txt write
 100.0.1.1 abc.com
 [gateway]# dnsspoof -i eth0 -f /etc/dnssniff.txt
 [bash]# host abc.com
 abc.com has address of 100.0.1.1
www.malc0de.org
INTRUSION DETECTION
SYSTEM
 Intrusion Detection Systems look for attack
signatures, which are specific patterns that
usually indicate malicious or suspicious intent.
www.malc0de.org
Intrusion Detection Systems
(IDS)
 Different ways of classifying an IDS
IDS based on
 anomaly detection
 signature based misuse
 host based
 network based
www.malc0de.org
Anomaly based IDS
 This IDS models the normal usage of the
network as a noise characterization.
 Anything distinct from the noise is assumed to
be an intrusion activity.
 E.g flooding a host with lots of packet.
 The primary strength is its ability to recognize
novel attacks.
www.malc0de.org
Signature based IDS
 This IDS possess an attacked description that
can be matched to sensed attack
manifestations.
 The question of what information is relevant to
an IDS depends upon what it is trying to
detect.
 E.g DNS, FTP etc.
www.malc0de.org
Network based IDS
 This IDS looks for attack signatures in
network traffic via a promiscuous interface.
 A filter is usually applied to determine which
traffic will be discarded or passed on to an
attack recognition module. This helps to filter
out known un-malicious traffic.
www.malc0de.org
INTRUSION PREVENTION
SYSTEM
www.malc0de.org
Host Based IPS
www.malc0de.org
Network Based IPS
www.malc0de.org
VIRTUAL PRIVATE
NETWORK
 A virtual private network (VPN) is a
technology that creates an encrypted
connection over a less secure network. The
benefit of using a VPN is that it ensures the
appropriate level of security to the connected
systems when the underlying network
infrastructure alone cannot provide it.
www.malc0de.org
VIRTUAL PRIVATE NETWORK
www.malc0de.org
Any Q?
www.malc0de.org
Thank you
www.malc0de.org

More Related Content

What's hot

Networking devices
Networking devicesNetworking devices
Networking devices
frestoadi
 
Cna
CnaCna
Network
NetworkNetwork
Network
niteshsarawat
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
3Anetwork com
 
Common network devices
Common network devicesCommon network devices
Common network devices
Raza Muhammad Jamali
 
Network components
Network componentsNetwork components
Network components
Anas Karzoun
 
Network Devices
Network DevicesNetwork Devices
Network Devices
Patel Gopal
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ramola Dhande
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
Bry Cunal
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
TechLinu.com
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
isma ishak
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
abhinav2727
 
Network devices
Network devicesNetwork devices
Network devices
Sonu Burnwal
 
Networking devices
Networking devicesNetworking devices
Networking devices
NetProtocol Xpert
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
Nitesh Singh
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
Siddique Ibrahim
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
Numaan Tole
 

What's hot (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Cna
CnaCna
Cna
 
Network
NetworkNetwork
Network
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
 
Common network devices
Common network devicesCommon network devices
Common network devices
 
Network components
Network componentsNetwork components
Network components
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 

Viewers also liked

Fundamentals Of Networking
Fundamentals Of NetworkingFundamentals Of Networking
Fundamentals Of Networking
kevinBrennan
 
01 basico redes
01 basico redes01 basico redes
01 basico redes
diegfc
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
Irsandi Hasan
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
NavleshKumar singh
 
[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS
[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS
[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS
Cisco Service Provider
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
Online
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
Jaya Kamnani
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
hazirma
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 

Viewers also liked (12)

Fundamentals Of Networking
Fundamentals Of NetworkingFundamentals Of Networking
Fundamentals Of Networking
 
01 basico redes
01 basico redes01 basico redes
01 basico redes
 
CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5CCNA Discovery 2 - Chapter 5
CCNA Discovery 2 - Chapter 5
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS
[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS
[Whitepaper] Cisco Vision: 5G - THRIVING INDOORS
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 

Similar to Networking Fundamentals

Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
Septafiansyah P
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
adam_merritt
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
Mohsen Sarakbi
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
Napier University
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Jeff Green
 
Ccna pres
Ccna presCcna pres
Ccna pres
Danish Nauman
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
CCNA
CCNACCNA
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
 
Networking basics
Networking basicsNetworking basics
Networking basics
Sridhar Baithi
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
Eric Vyncke
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Mohsen Sarakbi
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
EC-Council
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
Kristof De Brouwer
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
idsecconf
 
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua CiscoGiai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Tran Thanh Song
 
Mcse notes
Mcse notesMcse notes
Mcse notes
Dreams Design
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
Arunabh Mishra
 

Similar to Networking Fundamentals (20)

Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
CCNA
CCNACCNA
CCNA
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua CiscoGiai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
Giai phap bao mat - so sanh switch bao mat cua HDN va switch cua Cisco
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 

Recently uploaded

Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

Networking Fundamentals

  • 1. MD SAQUIB NASIR KHAN DIGITAL EVIDENCE ANALYST DATA64 | CIALFOR NETWORKING FUNDAMENTAL
  • 2. Contain  HUB, Switch, Router  MAC  IP  Packet Forwarding  Internet Protection  WLAN  Packet switching And Circuit switching  DNS  IDS & IPS  VPN www.malc0de.org
  • 3. HUB VS Switch VS Router www.malc0de.org
  • 4. HUB  No real understanding about transmit data between system  Only Broadcast packets  Number of system increase speed will decrease www.malc0de.org
  • 5. Switch  Switch Does not broadcast Packets its share the packet with the system for whom packets was sent  Does not consume Speed like HUB for packet Sharing www.malc0de.org
  • 6. Router  Router deals with broadcasting as well as Individual Message deliver  Act As firewall  APR table www.malc0de.org
  • 7. MAC  Media Access Control  Only for Network Adapter  Depends on ARP to communicate with others  Ipconfig/ifconfig  arp -a www.malc0de.org
  • 8. IP  Unique Address given to MAC address 124. 224. 224.100 01111100 11100000 11100000 01100100 www.malc0de.org
  • 9. Classes OF IP  Class Range  A 1-126 /8  B 127-191 /16  C 192-223 /24  D 224-239 Multicast  E 240-255 Experimental  0 & 127 General Use www.malc0de.org
  • 10. Classes of Private IP  Class Range  A /8 10.0.0.0-10.255.255.255  B /12 172.16.0.0-172.31.255.255  C /16 192.168.0.0-192.168.255.255 www.malc0de.org
  • 12. Network & Host Address  Class N/w + Host  A N+H+H+H  B N+N+H+H  C N+N+N+H www.malc0de.org
  • 13. Class Less Inter Domain Routing  128,64,32,16,8,4,2,1 --------.--------.--------.-------- CIDR/28 28 ON 4 OFF SUBNET FOR 100 SYSTEM? 300 subnet host number? www.malc0de.org
  • 14. 192.168.100.97/27  Find host address, network address, number of host gateways and broadcast address. www.malc0de.org
  • 15. 192.168.100.97/27  X.X.X.11100000  1110000> INCREMENT NUMBER(32{128,64,32})  X.X.X.32  X.X.X.64  X.X.X.96  SUBNET :96  Host: 00000 :31(16+8+4+2+1) Broadcast : 96+31=127 Range: 97-126 www.malc0de.org
  • 16. Type of IP Address  Static address  Dynamic address  Public  Private www.malc0de.org
  • 17. DHCP VS BOOTP  Class A - large organizations , governments  Class B - medium sized organizations  Class C - small organizations www.malc0de.org
  • 18. Networking Mode  Network Address Translation or NAT  Bridge Mode www.malc0de.org
  • 19. APPLICATION • HTTP, SMTP • FTP, DNS, TELNET TRANSPORT • TCP • UDP NETWORK • IP, ARP • ICMP, IGMP HOST-TO- NETWORK • ETHERNET • TOKEN RING TCP/IP www.malc0de.org
  • 20. Packet forwarding  It is a process that is by default enable in router. The router will perform packet forwarding only if route is available in the routing table. www.malc0de.org
  • 21. Metric of Dynamic Routing  Hop Count  Band Width  Load  Reliability  Delay  MTU www.malc0de.org
  • 22. Internet Protection  Internet Key Exchange (IKE or IKEv2)  Internet Protocol Security (IPsec)  Kerberos  Point-to-Point Protocol (PPP)  Transport Layer Security (TLS)  Secure Sockets Layer (SSL), www.malc0de.org
  • 23. WLAN  A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier.  The last link with the users is wireless, to give a network connection to all users in a building or campus.  The backbone network usually uses cables www.malc0de.org
  • 24. 1. WEP (Wired Equivalency Privacy/ Wireless Encryption Protocol) 2. WPA (Wi-Fi Protected Access) 3. WPA 2 (Wi-Fi Protected Access 2) WIRELESS NETWORKING www.malc0de.org
  • 25. WEP ( RC4 40bits to 128bits)  Wired Equivalent Privacy (WEP) – A protocol to protect link-level data during wireless transmission between clients and access points.  Services:  Authentication: provides access control to the network by denying access to client stations that fail to authenticate properly.  Confidentiality: intends to prevent information compromise from casual eavesdropping  Integrity: prevents messages from being modified while in transit between the wireless client and the access point www.malc0de.org
  • 26. Authentication CRC (Cyclic Redundant Check) www.malc0de.org
  • 27. WPA  48 bit IV  128 Bit key  TKIP (Temporal Key Integrity Protocol )  A Message Integrity Code (MIC) called Michael www.malc0de.org
  • 28. WAP 2  Uses the Advanced Encryption Standard (AES)  Symmetric-key block cipher using 128-bit keys.  Generates CCM Protocol (CCMP):  CCMP = CTR + CBC + MAC  CTR = Counter Mode Encryption  CBC/MAC = Cipher Block Chaining/Message Authentication Code www.malc0de.org
  • 29. Protocol Release date Op. Frequency Data rate (Max) Range (indoor) Range (outdoor) Legacy 1997 2.5~2.5 GHz 2 Mbit/s 802.11a 1999 5.15~5.35/5.47~5.72 5/5.725~5.875 GHz 54 Mbit/s ~25 m ~75 m 802.11b 1999 2.4~2.5GHz 11 Mbit/s ~35 m ~100 m 802.11g 2003 2.4~2.5GHz 54 Mbit/s ~25 m ~75 m 802.11n 2007 2.4GHz or 5GHz 540 Mbit/s ~50 m ~125 m 802.11 802.11 802.11a 802.11b 802.11g 802.11n 802.11 Wireless LAN Working Group www.malc0de.org
  • 30. Packet Switching Vs Circuit Switching www.malc0de.org
  • 31. DOMAIN NAME SYSTEM  DNS is directory Service.  Provides Name to IP address  Maps IP to Domain name and reverse  DNS runs on port 53  Runs on UDP  A –Address record name to 32 bit address  AAAA – Address Record name to 128 bit IPV6 address  www.malc0de.org
  • 33. www.malc0de.org DNS Cache Poisoning Attack  Exploit DNS poisoning attack  Change IP addresses to redirect URLs to fraudulent sites  Potentially more dangerous than phishing attacks  No email solicitation is required  DNS poisoning attacks have occurred:  January 2005, the domain name for a large New York ISP, Panix, was hijacked to a site in Australia.  In November 2004, Google and Amazon users were sent to Med Network Inc., an online pharmacy  In March 2003, a group dubbed the "Freedom Cyber Force Militia" hijacked visitors to the Al-Jazeera Web site and presented them with the message "God Bless Our Troops"
  • 34. DNS Spoofing Tools  Dsniff  dnsspoof  Example  abc.com IP address is 10.0.0.1  Make it spoof to respond 100.0.1.1  In the text file dnssniff.txt write  100.0.1.1 abc.com  [gateway]# dnsspoof -i eth0 -f /etc/dnssniff.txt  [bash]# host abc.com  abc.com has address of 100.0.1.1 www.malc0de.org
  • 35. INTRUSION DETECTION SYSTEM  Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent. www.malc0de.org
  • 36. Intrusion Detection Systems (IDS)  Different ways of classifying an IDS IDS based on  anomaly detection  signature based misuse  host based  network based www.malc0de.org
  • 37. Anomaly based IDS  This IDS models the normal usage of the network as a noise characterization.  Anything distinct from the noise is assumed to be an intrusion activity.  E.g flooding a host with lots of packet.  The primary strength is its ability to recognize novel attacks. www.malc0de.org
  • 38. Signature based IDS  This IDS possess an attacked description that can be matched to sensed attack manifestations.  The question of what information is relevant to an IDS depends upon what it is trying to detect.  E.g DNS, FTP etc. www.malc0de.org
  • 39. Network based IDS  This IDS looks for attack signatures in network traffic via a promiscuous interface.  A filter is usually applied to determine which traffic will be discarded or passed on to an attack recognition module. This helps to filter out known un-malicious traffic. www.malc0de.org
  • 43. VIRTUAL PRIVATE NETWORK  A virtual private network (VPN) is a technology that creates an encrypted connection over a less secure network. The benefit of using a VPN is that it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. www.malc0de.org