Podcast
Questions and Answers
What must be obtained before reproducing or distributing contents from this document?
What must be obtained before reproducing or distributing contents from this document?
- No permission required
- Verbal agreement
- Public domain rights
- Express prior written permission (correct)
Which part of an HTTP URI specifies the protocol used?
Which part of an HTTP URI specifies the protocol used?
- Scheme (correct)
- Query
- Path
- Host
What is the default port for HTTP requests?
What is the default port for HTTP requests?
- 8080
- 21
- 80 (correct)
- 443
In what scenario would a POST request be more suitable than a GET request?
In what scenario would a POST request be more suitable than a GET request?
What component follows the path in an HTTP URI and allows passing parameters?
What component follows the path in an HTTP URI and allows passing parameters?
Which of the following HTTP methods is NOT commonly implemented by servers?
Which of the following HTTP methods is NOT commonly implemented by servers?
What do HTTP headers consist of?
What do HTTP headers consist of?
Which part of a query string is used by Google to represent what is being searched?
Which part of a query string is used by Google to represent what is being searched?
What is displayed in the first pane of the Wireshark interface?
What is displayed in the first pane of the Wireshark interface?
Which protocols can be encapsulated within a frame as shown in the second pane?
Which protocols can be encapsulated within a frame as shown in the second pane?
What type of data representation is provided in the third pane of Wireshark?
What type of data representation is provided in the third pane of Wireshark?
How is hexadecimal data represented in Wireshark?
How is hexadecimal data represented in Wireshark?
What is the purpose of using the display filter in Wireshark?
What is the purpose of using the display filter in Wireshark?
What would the filter 'ip.dst == 192.168.1.3' achieve in Wireshark?
What would the filter 'ip.dst == 192.168.1.3' achieve in Wireshark?
Which logical operators can be combined with filters in Wireshark?
Which logical operators can be combined with filters in Wireshark?
Which of the following best describes the overall functionality of Wireshark?
Which of the following best describes the overall functionality of Wireshark?
What is the format of an IP address?
What is the format of an IP address?
What does the broadcast IP address typically end with?
What does the broadcast IP address typically end with?
Which of the following ranges represents multicast IP addresses?
Which of the following ranges represents multicast IP addresses?
What should be true for an IP address to be classified as public?
What should be true for an IP address to be classified as public?
What is the significance of private IP addresses?
What is the significance of private IP addresses?
Which of the following is NOT a range of private IP addresses?
Which of the following is NOT a range of private IP addresses?
What must protocols in a network contain to reach their intended recipient?
What must protocols in a network contain to reach their intended recipient?
What happens to a device that subscribes to a multicast address?
What happens to a device that subscribes to a multicast address?
What is the primary purpose of the 'User Agent' header?
What is the primary purpose of the 'User Agent' header?
What does a User Agent string allow the server to do?
What does a User Agent string allow the server to do?
Which component is NOT typically included in a User Agent string?
Which component is NOT typically included in a User Agent string?
What should one do with the document without express prior written permission from Red Alpha Cybersecurity?
What should one do with the document without express prior written permission from Red Alpha Cybersecurity?
What information does the HTTP response provide?
What information does the HTTP response provide?
What is the effect of HTTP response codes?
What is the effect of HTTP response codes?
What type of document is described in the content?
What type of document is described in the content?
Why is the information extracted from a User Agent string valuable?
Why is the information extracted from a User Agent string valuable?
What is the significance of a public IP address for an internet network?
What is the significance of a public IP address for an internet network?
Which of the following statements about MAC addresses is true?
Which of the following statements about MAC addresses is true?
What is the format of a Broadcast MAC address?
What is the format of a Broadcast MAC address?
Why are port numbers important in network communication?
Why are port numbers important in network communication?
Which of the following correctly describes multicast MAC addresses?
Which of the following correctly describes multicast MAC addresses?
What is an OUI in the context of MAC addresses?
What is an OUI in the context of MAC addresses?
What happens if a device has a private IP address?
What happens if a device has a private IP address?
In a valid MAC address format, which components can represent the values?
In a valid MAC address format, which components can represent the values?
What is the main purpose of DNS in internet browsing?
What is the main purpose of DNS in internet browsing?
What type of query does a DNS client send to get an IP address?
What type of query does a DNS client send to get an IP address?
What does a DNS reply include in its response?
What does a DNS reply include in its response?
In the context of online gaming, how does DNS function?
In the context of online gaming, how does DNS function?
Which statement is true regarding DNS queries and HTTPS communications?
Which statement is true regarding DNS queries and HTTPS communications?
How does the structure of a DNS reply differ from a DNS query?
How does the structure of a DNS reply differ from a DNS query?
What is indicated when a computer shuts down while browsing and a network sniffer is running?
What is indicated when a computer shuts down while browsing and a network sniffer is running?
Why is DNS crucial for human usability in Internet browsing?
Why is DNS crucial for human usability in Internet browsing?
Flashcards
IP Address (Internet Protocol Address)
IP Address (Internet Protocol Address)
A unique identifier assigned to a device on a network.
MAC Address (Media Access Control Address)
MAC Address (Media Access Control Address)
A unique identifier assigned to a network interface card (NIC) on a device.
Broadcast IP Address
Broadcast IP Address
An IP address that allows communication with all devices on a local network.
Multicast IP Address
Multicast IP Address
Signup and view all the flashcards
Private IP Address
Private IP Address
Signup and view all the flashcards
Public IP Address
Public IP Address
Signup and view all the flashcards
Network Packet
Network Packet
Signup and view all the flashcards
Application Protocol
Application Protocol
Signup and view all the flashcards
What is a MAC address?
What is a MAC address?
Signup and view all the flashcards
What is OUI?
What is OUI?
Signup and view all the flashcards
What is a broadcast MAC address?
What is a broadcast MAC address?
Signup and view all the flashcards
What are multicast MAC addresses?
What are multicast MAC addresses?
Signup and view all the flashcards
What is a port number?
What is a port number?
Signup and view all the flashcards
What is an IP address?
What is an IP address?
Signup and view all the flashcards
What is a public IP address?
What is a public IP address?
Signup and view all the flashcards
What is a private IP address?
What is a private IP address?
Signup and view all the flashcards
Wireshark Capture Pane
Wireshark Capture Pane
Signup and view all the flashcards
Wireshark Protocol Pane
Wireshark Protocol Pane
Signup and view all the flashcards
Wireshark Binary Dump Pane
Wireshark Binary Dump Pane
Signup and view all the flashcards
Wireshark Display Filtering
Wireshark Display Filtering
Signup and view all the flashcards
Wireshark Source IP Filter
Wireshark Source IP Filter
Signup and view all the flashcards
Wireshark Destination IP Filter
Wireshark Destination IP Filter
Signup and view all the flashcards
Wireshark Protocol Filter
Wireshark Protocol Filter
Signup and view all the flashcards
Wireshark Logical Operators
Wireshark Logical Operators
Signup and view all the flashcards
What is a URI?
What is a URI?
Signup and view all the flashcards
What are the parts of an HTTP URI?
What are the parts of an HTTP URI?
Signup and view all the flashcards
What is the scheme in an HTTP URI?
What is the scheme in an HTTP URI?
Signup and view all the flashcards
What is the host in an HTTP URI?
What is the host in an HTTP URI?
Signup and view all the flashcards
What is the port in an HTTP URI?
What is the port in an HTTP URI?
Signup and view all the flashcards
What is the path in an HTTP URI?
What is the path in an HTTP URI?
Signup and view all the flashcards
What is the query in an HTTP URI?
What is the query in an HTTP URI?
Signup and view all the flashcards
What are the most common HTTP methods?
What are the most common HTTP methods?
Signup and view all the flashcards
What is the User-Agent header?
What is the User-Agent header?
Signup and view all the flashcards
How can the server use the User-Agent header?
How can the server use the User-Agent header?
Signup and view all the flashcards
What information does the User-Agent header contain?
What information does the User-Agent header contain?
Signup and view all the flashcards
What is an Application Protocol?
What is an Application Protocol?
Signup and view all the flashcards
What are HTTP response codes?
What are HTTP response codes?
Signup and view all the flashcards
Who sends the 'User-Agent' header?
Who sends the 'User-Agent' header?
Signup and view all the flashcards
Why is the 'User-Agent' header useful?
Why is the 'User-Agent' header useful?
Signup and view all the flashcards
Are there other HTTP request headers besides 'User-Agent'?
Are there other HTTP request headers besides 'User-Agent'?
Signup and view all the flashcards
What is DNS (Domain Name System)?
What is DNS (Domain Name System)?
Signup and view all the flashcards
DNS Query
DNS Query
Signup and view all the flashcards
DNS Reply
DNS Reply
Signup and view all the flashcards
How does DNS work?
How does DNS work?
Signup and view all the flashcards
How can you see websites visited even when HTTPS is used?
How can you see websites visited even when HTTPS is used?
Signup and view all the flashcards
What is Content-Encoding?
What is Content-Encoding?
Signup and view all the flashcards
HTTPS
HTTPS
Signup and view all the flashcards
What is Wireshark?
What is Wireshark?
Signup and view all the flashcards
Study Notes
Cybersecurity Incident Basics
- Every cybersecurity incident starts with a motivated attacker.
- Attackers' motives can include money, power, fame, or revenge.
- Targets can be individuals, companies, organizations, or countries.
- Internet-connected networks are often used for attacks.
- Malware infection and control are intermediate steps for attackers.
- Attackers often extract data through the same network they used for the attack.
- Network forensics helps understand attack origins, data leaks, and attackers' motives.
Network Packets and Protocols
- Network packets carry various types of information similarly to letters.
- Envelopes in a network are called packets, and the information type is referred to as the application protocol.
- Addresses (IP and MAC) in networks ensure correct recipient delivery.
- IP addresses are four-part number groups (0-255) and are network-dependent.
- Broadcast IP addresses are meant for all network devices, while multicast addresses are targeted.
- Private IP addresses (e.g. 10.0.0.0-10.255.255.255, 192.168.0.0-192.168.255.255, 172.16.0.0-172.31.255.255) are not unique to a specific device.
- Public IP addresses must be unique.
- MAC addresses are unique to network hardware and cannot be changed.
MAC Addresses and Special Addresses
- MAC addresses are fixed hardware addresses in a specific format (XX-XX-XX-XX-XX-XX).
- Organization Unique Identifiers (OUIs) identify manufacturers.
- Broadcast MAC addresses (FF-FF-FF-FF-FF-FF) will be received by all devices on a network.
- Multicast MAC addresses start with a specific prefix and are used for specific communication.
Ports and Application Protocols
- Port numbers range from 1 to 65,535 and identify specific applications.
- They allow network packets to be routed to the correct application.
- Popular Protocols: HTTP, DNS, TCP
- HTTP servers are located on ports 80 or 443.
- DNS translates domain names to IP addresses.
Network Packet Analysis with Wireshark
- Wireshark is a network traffic monitoring and analysis tool.
- It logs network traffic, including malicious activity, and allows offline analysis of packet capture files (PCAP).
- It can analyze network traffic in real-time or through existing PCAP files.
Wireshark Analysis
- Wireshark displays captured frames categorized by protocols (Ethernet, IP, TCP, HTTP).
- It enables sorting, filtering, and focusing on specific data by protocol and address.
- Filters like
ip.dst == [IP address]
allow targeting specific network traffic based on destination IP
HTTP Protocols
- HTTP is a client/server protocol where clients send requests, and servers respond.
- HTTP requests include the type of request, desired resources, or commands.
- HTTP headers provide additional information about the request.
- Common header fields include "User-Agent," which reveals client information (e.g., browser, OS).
- HTTP responses indicate whether a request was successful (e.g., 200 OK), redirected, or resulted in a client or server error.
- HTTP protocol uses numbered codes to report success or failure.
DNS Lookups
- DNS translates domain names to IP addresses.
- DNS servers help resolve domain names to IP addresses during internet browsing.
- DNS requests are typically sent before HTTP requests.
Guided Example
- John's network investigation involves examining IP addresses, MAC addresses, operating systems, and browsers, examining a PCAP file, using Wireshark's statistical tools.
- Public and private IPs are identified and special IPs (e.g., broadcast and multicast) are separated out
- MAC addresses and their associated OUI (Organization Unique Identifier) groups are examined as real devices or broadcast addresses/multicast are separated.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.