Podcast
Questions and Answers
What is the primary purpose of sub-netting in networking?
What is the primary purpose of sub-netting in networking?
- To enhance the security protocol of wireless connections.
- To facilitate direct communication between different network providers.
- To divide a larger network into smaller, manageable segments. (correct)
- To increase the overall bandwidth of the network.
Which CIDR notation represents a subnet mask of 255.255.255.128?
Which CIDR notation represents a subnet mask of 255.255.255.128?
- /25 (correct)
- /26
- /27
- /24
In network analysis, which tool is primarily used for capturing and inspecting network traffic?
In network analysis, which tool is primarily used for capturing and inspecting network traffic?
- iptables
- Wireshark (correct)
- tcpdump
- ping
What does the ARP command primarily do in a network?
What does the ARP command primarily do in a network?
Which of the following is NOT a basic function of an iptables firewall?
Which of the following is NOT a basic function of an iptables firewall?
What does the 'Follow Streams' feature in Wireshark allow a user to do?
What does the 'Follow Streams' feature in Wireshark allow a user to do?
Which security protocol is specifically designed for Wi-Fi networks?
Which security protocol is specifically designed for Wi-Fi networks?
What is a common use of Aircrack-ng commands in networking?
What is a common use of Aircrack-ng commands in networking?
How many usable subnets can be created by borrowing 3 bits from the host portion?
How many usable subnets can be created by borrowing 3 bits from the host portion?
What is the maximum number of hosts per subnet when 5 bits are left in the network portion after borrowing?
What is the maximum number of hosts per subnet when 5 bits are left in the network portion after borrowing?
Which command would you use to check your network configuration in Kali Linux?
Which command would you use to check your network configuration in Kali Linux?
What does the ping command help determine?
What does the ping command help determine?
Which component of the ifconfig command output provides the default gateway?
Which component of the ifconfig command output provides the default gateway?
What is the result of using 3 bits for subnets in terms of the subnet mask?
What is the result of using 3 bits for subnets in terms of the subnet mask?
How would you ping a domain using its name?
How would you ping a domain using its name?
What does the subnetting process involve when modifying an IP address?
What does the subnetting process involve when modifying an IP address?
What is the primary purpose of subnetting in IP addressing?
What is the primary purpose of subnetting in IP addressing?
Which of the following correctly describes a subnet?
Which of the following correctly describes a subnet?
What does a subnet mask indicate?
What does a subnet mask indicate?
In CIDR notation, what does the number after the slash represent?
In CIDR notation, what does the number after the slash represent?
Which class of network has a standard network ID of 24 bits?
Which class of network has a standard network ID of 24 bits?
What would be the result of applying a binary AND operation between an IP address and its subnet mask?
What would be the result of applying a binary AND operation between an IP address and its subnet mask?
Which of the following statements about subnets is true?
Which of the following statements about subnets is true?
What can be a consequence of not using subnetting effectively in a large organization?
What can be a consequence of not using subnetting effectively in a large organization?
Flashcards
Sub-netting
Sub-netting
A technique used to divide a large network into smaller, more manageable subnets, improving network efficiency and security.
Subnet
Subnet
A smaller network within a larger network, identified by a unique subnet mask.
Subnet Mask
Subnet Mask
A 32-bit number that defines the network and host portions of an IP address.
CIDR Notation
CIDR Notation
Signup and view all the flashcards
Network Analysis
Network Analysis
Signup and view all the flashcards
Network Sniffers
Network Sniffers
Signup and view all the flashcards
tcpdump
tcpdump
Signup and view all the flashcards
Wireshark
Wireshark
Signup and view all the flashcards
Borrowing Bits
Borrowing Bits
Signup and view all the flashcards
Ping
Ping
Signup and view all the flashcards
ifconfig
ifconfig
Signup and view all the flashcards
What is sub-netting?
What is sub-netting?
Signup and view all the flashcards
How are subnets created?
How are subnets created?
Signup and view all the flashcards
What is a network mask?
What is a network mask?
Signup and view all the flashcards
What is CIDR notation?
What is CIDR notation?
Signup and view all the flashcards
How does a network mask work?
How does a network mask work?
Signup and view all the flashcards
What are the benefits of sub-netting?
What are the benefits of sub-netting?
Signup and view all the flashcards
Explain the relationship between network classes and sub-netting.
Explain the relationship between network classes and sub-netting.
Signup and view all the flashcards
Why is sub-netting important?
Why is sub-netting important?
Signup and view all the flashcards
Study Notes
Network Basics for Hackers
- This book is about networking basics and how they can be broken
- It's one of a series of books on hacking from Occupytheweb
- The intended audience is people with little or no networking background
- The book uses Kali Linux as its platform
- The book assumes the reader has read a prior book, Linux Basics for Hackers
Table of Contents
-
Prelude
- What is a White Hat Hacker?
- Our Actions and Activities in Ukraine
-
Network Basics
- IP Addresses
- Classes of IP addresses
- Public v Private IP addresses
- DHCP
- NAT
- Ports
- TCP/IP
- Protocols
- TCP
- UDP
- TCP Three-Way Handshake
- Network Topologies
- OSI Model
- Exercises
-
Subnetting and CIDR Notation
- Why Sub-netting
- Sub-Nets
- Sub-net Masks
- CIDR Notation
- Exercises
-
Network Analysis
- Command-line (CLI) network analysis Tools
- Network Sniffers
- tcpdump
- Wireshark
- Creating Filters in Wireshark
- Following Streams
- Statistics
- Exercises
-
Linux Firewalls
- iptables basics
- Installing iptables
- Configuring iptables
- Creating rules
- Exercises
-
Wi-Fi Networks (802.11)
- Wi-Fi Basics
- Wi-Fi Security Protocols
- Wi-Fi Adapters for Hacking
- Aircrack-ng commands
- Anatomy of Wi-Fi Frames
- Wireshark Filters for Wi-Fi Frames
- Attacking Wi-Fi APs
- Wi-Fi Exercises
-
Bluetooth Networks
- Basic Linux Bluetooth Tools
- Bluetooth Basics
- Bluetooth Protocol Stack
- Bluetooth Security
- Bluetooth Hacking Tools
- Bluetooth Hacking Tools
- Exercises
-
Address Resolution Protocol (ARP)
- How ARP Works
- ARP Command
- ARP Packets in Wireshark
- Exercises
-
Domain Name System (DNS)
- Domain Names
- How DNS Works
- DNS Components
- Zone Files and Records
- Common Resource Record Types
- SOA Records
- Packet Level Analysis of DNS Queries
- Exercises
-
Server Message Block (SMB)
- What is SMB
- SMB Vulnerabilities
- Exercises
-
Simple Message Transfer Protocol (SMTP)
- What is SMTP
- The Email Processing Model
- Types of MTUs
- Packet-Level Analysis with Wireshark
- Building an SMTP (EXIM4) Server in Linux
- Exercises
-
Simple Network Management Protocol (SNMP)
- Background on SNMP
- SNMP Versions
- Wireshark Analysis
- Exercises
- Background on SNMP
-
HTTP Protocol
- HTTP Requests
- HTTP Responses
- HTTP Methods
- URls
- HTTP Headers
- Cookies
-
HTTP Authentication
-
Hacking Web App Authentication with BurpSuite
-
Exercises
-
Automobile Networks
- The CAN Protocol
- Techniques for attacking automobile networks and devices
- Exercises
-
SCADA/ICS Networks
- SCADA/ICS Manufacturers
- SCADA/ICS Communication Protocols
- Exercises
-
Radio Frequency Networks with SDR
- Radio-based technologies
- Terminology
- AP
- PSK
- SSID
- ESSID
- BSSID
- Channels
- Power
- Security
- Wi-Fi (802.11) Security Protocols
- WEP
- WPA
- WPA2
- Wi-Fi Adapters for Hacking
- Viewing Wireless Interfaces
- Monitor Mode
- Capturing Frames
- Filter by Port, ID, etc.
- Exercises
-
Exercises
-
Appendix A - Cyber Warrior Wisdom of Master OTW
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.