Podcast
Questions and Answers
What is the primary purpose of sub-netting in networking?
What is the primary purpose of sub-netting in networking?
Which CIDR notation represents a subnet mask of 255.255.255.128?
Which CIDR notation represents a subnet mask of 255.255.255.128?
In network analysis, which tool is primarily used for capturing and inspecting network traffic?
In network analysis, which tool is primarily used for capturing and inspecting network traffic?
What does the ARP command primarily do in a network?
What does the ARP command primarily do in a network?
Signup and view all the answers
Which of the following is NOT a basic function of an iptables firewall?
Which of the following is NOT a basic function of an iptables firewall?
Signup and view all the answers
What does the 'Follow Streams' feature in Wireshark allow a user to do?
What does the 'Follow Streams' feature in Wireshark allow a user to do?
Signup and view all the answers
Which security protocol is specifically designed for Wi-Fi networks?
Which security protocol is specifically designed for Wi-Fi networks?
Signup and view all the answers
What is a common use of Aircrack-ng commands in networking?
What is a common use of Aircrack-ng commands in networking?
Signup and view all the answers
How many usable subnets can be created by borrowing 3 bits from the host portion?
How many usable subnets can be created by borrowing 3 bits from the host portion?
Signup and view all the answers
What is the maximum number of hosts per subnet when 5 bits are left in the network portion after borrowing?
What is the maximum number of hosts per subnet when 5 bits are left in the network portion after borrowing?
Signup and view all the answers
Which command would you use to check your network configuration in Kali Linux?
Which command would you use to check your network configuration in Kali Linux?
Signup and view all the answers
What does the ping command help determine?
What does the ping command help determine?
Signup and view all the answers
Which component of the ifconfig command output provides the default gateway?
Which component of the ifconfig command output provides the default gateway?
Signup and view all the answers
What is the result of using 3 bits for subnets in terms of the subnet mask?
What is the result of using 3 bits for subnets in terms of the subnet mask?
Signup and view all the answers
How would you ping a domain using its name?
How would you ping a domain using its name?
Signup and view all the answers
What does the subnetting process involve when modifying an IP address?
What does the subnetting process involve when modifying an IP address?
Signup and view all the answers
What is the primary purpose of subnetting in IP addressing?
What is the primary purpose of subnetting in IP addressing?
Signup and view all the answers
Which of the following correctly describes a subnet?
Which of the following correctly describes a subnet?
Signup and view all the answers
What does a subnet mask indicate?
What does a subnet mask indicate?
Signup and view all the answers
In CIDR notation, what does the number after the slash represent?
In CIDR notation, what does the number after the slash represent?
Signup and view all the answers
Which class of network has a standard network ID of 24 bits?
Which class of network has a standard network ID of 24 bits?
Signup and view all the answers
What would be the result of applying a binary AND operation between an IP address and its subnet mask?
What would be the result of applying a binary AND operation between an IP address and its subnet mask?
Signup and view all the answers
Which of the following statements about subnets is true?
Which of the following statements about subnets is true?
Signup and view all the answers
What can be a consequence of not using subnetting effectively in a large organization?
What can be a consequence of not using subnetting effectively in a large organization?
Signup and view all the answers
Study Notes
Network Basics for Hackers
- This book is about networking basics and how they can be broken
- It's one of a series of books on hacking from Occupytheweb
- The intended audience is people with little or no networking background
- The book uses Kali Linux as its platform
- The book assumes the reader has read a prior book, Linux Basics for Hackers
Table of Contents
-
Prelude
- What is a White Hat Hacker?
- Our Actions and Activities in Ukraine
-
Network Basics
- IP Addresses
- Classes of IP addresses
- Public v Private IP addresses
- DHCP
- NAT
- Ports
- TCP/IP
- Protocols
- TCP
- UDP
- TCP Three-Way Handshake
- Network Topologies
- OSI Model
- Exercises
-
Subnetting and CIDR Notation
- Why Sub-netting
- Sub-Nets
- Sub-net Masks
- CIDR Notation
- Exercises
-
Network Analysis
- Command-line (CLI) network analysis Tools
- Network Sniffers
- tcpdump
- Wireshark
- Creating Filters in Wireshark
- Following Streams
- Statistics
- Exercises
-
Linux Firewalls
- iptables basics
- Installing iptables
- Configuring iptables
- Creating rules
- Exercises
-
Wi-Fi Networks (802.11)
- Wi-Fi Basics
- Wi-Fi Security Protocols
- Wi-Fi Adapters for Hacking
- Aircrack-ng commands
- Anatomy of Wi-Fi Frames
- Wireshark Filters for Wi-Fi Frames
- Attacking Wi-Fi APs
- Wi-Fi Exercises
-
Bluetooth Networks
- Basic Linux Bluetooth Tools
- Bluetooth Basics
- Bluetooth Protocol Stack
- Bluetooth Security
- Bluetooth Hacking Tools
- Bluetooth Hacking Tools
- Exercises
-
Address Resolution Protocol (ARP)
- How ARP Works
- ARP Command
- ARP Packets in Wireshark
- Exercises
-
Domain Name System (DNS)
- Domain Names
- How DNS Works
- DNS Components
- Zone Files and Records
- Common Resource Record Types
- SOA Records
- Packet Level Analysis of DNS Queries
- Exercises
-
Server Message Block (SMB)
- What is SMB
- SMB Vulnerabilities
- Exercises
-
Simple Message Transfer Protocol (SMTP)
- What is SMTP
- The Email Processing Model
- Types of MTUs
- Packet-Level Analysis with Wireshark
- Building an SMTP (EXIM4) Server in Linux
- Exercises
-
Simple Network Management Protocol (SNMP)
- Background on SNMP
- SNMP Versions
- Wireshark Analysis
- Exercises
- Background on SNMP
-
HTTP Protocol
- HTTP Requests
- HTTP Responses
- HTTP Methods
- URls
- HTTP Headers
- Cookies
-
HTTP Authentication
-
Hacking Web App Authentication with BurpSuite
-
Exercises
-
Automobile Networks
- The CAN Protocol
- Techniques for attacking automobile networks and devices
- Exercises
-
SCADA/ICS Networks
- SCADA/ICS Manufacturers
- SCADA/ICS Communication Protocols
- Exercises
-
Radio Frequency Networks with SDR
- Radio-based technologies
- Terminology
- AP
- PSK
- SSID
- ESSID
- BSSID
- Channels
- Power
- Security
- Wi-Fi (802.11) Security Protocols
- WEP
- WPA
- WPA2
- Wi-Fi Adapters for Hacking
- Viewing Wireless Interfaces
- Monitor Mode
- Capturing Frames
- Filter by Port, ID, etc.
- Exercises
-
Exercises
-
Appendix A - Cyber Warrior Wisdom of Master OTW
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your understanding of key networking concepts and tools with this quiz. Questions cover sub-netting, network traffic analysis, firewall functions, and security protocols. Perfect for students and professionals looking to refresh their knowledge.