SlideShare a Scribd company logo

Networking Recap
Network Security Workshop

                            Dedi Dwianto, C|EH, OSCP
      Daftar ISI
Contents

 Review of networking basics

 OSI 7 layer models

 TCP/IP – Internet models

 Common network protocols
Review of networking basics




               Networking
Networking Components

 HUB

 SWITCH

 ROUTER

 HOST
Networking Components

 Network edge :
    Applications
    Hosts

 Network core :
    Routers
    Network of networks

 Access network, physical media :
    Communication links
The Network Core

 Mesh of interconnected routers
OSI 7 Layer Model
Physical Layer Vulnerabilities

 Loss of power

 Loss of environmental control

 Physical damage or destruction of data and hardware

 Unauthorized changes to the functional environment

 Disconnection of physical data links

 Undetectable interception of data
Data Link Layer Vulnerabilities

 MAC address spoofing

 VLAN circumvention

 Spanning tree errors
Network Layer Vulnerabilities

 Route spoofing - propagation of false network topology

 IP Address Spoofing- false source addressing on malicious
   packets

 Identity & Resource ID Vulnerability
Transport Layer Vulnerabilities

 Mishandling of undefined, poorly defined, or “illegal”
   conditions
 Differences in transport protocol implementation allow
   “fingerprinting’ and otherenumeration of host information
 Overloading of transport-layer mechanisms such as port
   numbers limit the abilityto effectively filter and qualify
   traffic.
 Transmission mechanisms can be subject to spoofing and
   attack based oncrafted packets.
Session Layer Vulnerabilities

 Weak or non-existent authentication mechanisms

 Session identification may be subject to spoofing and
   hijack

 Leakage of information based on failed authentication
   attempts

 Unlimited failed sessions allow brute-force attacks on
   access credentials
Presentation Layer Vulnerabilities

 Poor handling of unexpected input can lead to application
   crashes or surrender of control to execute arbitrary
   instructions.

 Unintentional or ill-advised use of externally supplied
   input in control contexts may allow remote manipulation
   or information leakage.

 Cryptographic flaws may be exploited to circumvent
   privacy protections .
Application Layer Vulnerabilities

 Open design issues allow free use of application resources
   by unintended parties

 Backdoors and application design flaws bypass standard
   security controls

 Inadequate security controls force “all-or-nothing”
   approach, resulting in either excessive or insufficient
   access.
TCP/IP – Model
TCP Header
UDP Header
IP Header
TCP/IP Tunneling
Connection-oriented service

 TCP – Transmission Control Protocol

 TCP Service [ RFC 793 ]
    Reliable, in-order byte stream data transfer
    Flow control
    Congestion control
Connection-oriented service

 TCP handshaking :
    Setup (prepare for) data transfer ahead of time
Connection-oriented service

 TCP – Transmission Control Protocol

 TCP Service [ RFC 793 ]
    Reliable, in-order byte stream data transfer
    Flow control
    Congestion control
Connectionless

 UDP – User Datagram Protocol

 UDP Service [ RFC 768 ]
    Unreliable data transfer
    No flow control
    No congestion control
Internet

 Internet “millions of connected computing devices :
   hosts, end-system”

 Internet “ network of networks”

 Internet standard :
    RFC : Request for comments
    IETF : Internet Engineering Task Force
Common Network Protocol

 Protocols – control sending, receiving of messages
    Example :
        TCP
        IP
        HTTP
        FTP
        PPP
Application Layer Protocols

 Application : communicating, distributed processes

 Application-layer protocols :
    One “piece” of an application
    Define messages exchanged by applications and action
     taken
    Use communication services provided by lower layer (TCP,
     UDP)
    Types of messages exchanged
Application Layer Protocols

 Public domain protocols :
     Defined in RFCs
     Allows for interoperability
     Example : HTTP, SMTP

   Proprietary protocols :
     Skype
     MS Exchange
     VTP
Network Application

 Typical network application has two pieces : client and
   server

 Client :
    Initiates contact with server
    Typically request services from server
    Web : client implemented in browser
    Email : in mail reader
Network Application

 Server:
    Provides requested service to client
    Example :
       Web server send requested web page
Internet Apps : application, transport
                                       protocols

Application              App Layer Protocol   Transport Protocol
Email                    SMTP [RFC 2821]      TCP
Remote Terminal Access   Telnet [RFC 854]     TCP
Web                      HTTP [RFC 2616]      TCP
File transfer            FTP [RFC 959]        TCP
Streaming multimedia     Proprietary          TCP and UDP

More Related Content

PPTX
PPT
Domain-Specific Software Engineering
PPTX
3d transistor
PPTX
Kr using rules
PPTX
Junctionless transistors
PPTX
A Simple Introduction to Word Embeddings
PPTX
Care for Network and Computer Hardware L-2 (3).pptx
PPTX
Ethics and computing profession
Domain-Specific Software Engineering
3d transistor
Kr using rules
Junctionless transistors
A Simple Introduction to Word Embeddings
Care for Network and Computer Hardware L-2 (3).pptx
Ethics and computing profession

What's hot (20)

PPT
intrusion detection system (IDS)
PPTX
Vlsi stick daigram (JCE)
PPTX
Deep learning approach for network intrusion detection system
PPTX
SE2023 0301 Software Project Management.pptx
PPTX
Fundamentals of Network security
PPT
Vlsi design and fabrication ppt
PPTX
Fasttext 20170720 yjy
PDF
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
PDF
CERTIFICATE MCSA.PDF
PPT
Object Oriented Design Concept
PPT
Intrusion Detection System using Snort
PPTX
Ch 5 contract review
PDF
Introduction to VLSI Design
PDF
Wps pixie dust attack
PPT
PPTX
Components of a complete electronic data processing
PPTX
CNS Unit-1.pptx
PDF
Analyzing Text Preprocessing and Feature Selection Methods for Sentiment Anal...
PDF
Natural Language Toolkit (NLTK), Basics
PDF
Question Answering - Application and Challenges
intrusion detection system (IDS)
Vlsi stick daigram (JCE)
Deep learning approach for network intrusion detection system
SE2023 0301 Software Project Management.pptx
Fundamentals of Network security
Vlsi design and fabrication ppt
Fasttext 20170720 yjy
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
CERTIFICATE MCSA.PDF
Object Oriented Design Concept
Intrusion Detection System using Snort
Ch 5 contract review
Introduction to VLSI Design
Wps pixie dust attack
Components of a complete electronic data processing
CNS Unit-1.pptx
Analyzing Text Preprocessing and Feature Selection Methods for Sentiment Anal...
Natural Language Toolkit (NLTK), Basics
Question Answering - Application and Challenges
Ad

Similar to Networking recap (20)

PPT
Week1 lec2-bscs1
PPT
App layer
PPT
02 protocol architecture
PDF
Computer networking (nnm)
PPT
3rd edition chapter1
PDF
02-ProtocolArchitecture.pdf
PDF
Aplication and Transport layer- a practical approach
PPT
internet protocol and networking basic bachelor of science in informATION TEE...
PPT
ip-basics.ppt
PPT
ip net basic understanding slide show ppt
PDF
Chapter1 sept 8_05[one.]
PPT
Network Lauers in TCP/IP computer networks
PPT
Ccna introduction
PPTX
Week2 lec2-bscs1
PPTX
Lecture 02 networking
PPT
Datacom_Section_2_-_Protocols.ppt
PDF
Lec 2 and_3
PPTX
Ch4 Protocols.pptx
PDF
Ccent notes part 1
PPTX
OSI Model.pptx
Week1 lec2-bscs1
App layer
02 protocol architecture
Computer networking (nnm)
3rd edition chapter1
02-ProtocolArchitecture.pdf
Aplication and Transport layer- a practical approach
internet protocol and networking basic bachelor of science in informATION TEE...
ip-basics.ppt
ip net basic understanding slide show ppt
Chapter1 sept 8_05[one.]
Network Lauers in TCP/IP computer networks
Ccna introduction
Week2 lec2-bscs1
Lecture 02 networking
Datacom_Section_2_-_Protocols.ppt
Lec 2 and_3
Ch4 Protocols.pptx
Ccent notes part 1
OSI Model.pptx
Ad

More from Dedi Dwianto (7)

PDF
Application Security Trends and Issues
PPTX
Trend Kejahatan Cyber 2015
PPTX
Security Awareness
PPTX
Ancaman & kelemahan server
PPTX
Network Security Risk
PPTX
Vulnerability Assesment
PPTX
what is security
Application Security Trends and Issues
Trend Kejahatan Cyber 2015
Security Awareness
Ancaman & kelemahan server
Network Security Risk
Vulnerability Assesment
what is security

Networking recap

  • 1.  Networking Recap Network Security Workshop Dedi Dwianto, C|EH, OSCP Daftar ISI
  • 2. Contents  Review of networking basics  OSI 7 layer models  TCP/IP – Internet models  Common network protocols
  • 3. Review of networking basics Networking
  • 4. Networking Components  HUB  SWITCH  ROUTER  HOST
  • 5. Networking Components  Network edge :  Applications  Hosts  Network core :  Routers  Network of networks  Access network, physical media :  Communication links
  • 6. The Network Core  Mesh of interconnected routers
  • 7. OSI 7 Layer Model
  • 8. Physical Layer Vulnerabilities  Loss of power  Loss of environmental control  Physical damage or destruction of data and hardware  Unauthorized changes to the functional environment  Disconnection of physical data links  Undetectable interception of data
  • 9. Data Link Layer Vulnerabilities  MAC address spoofing  VLAN circumvention  Spanning tree errors
  • 10. Network Layer Vulnerabilities  Route spoofing - propagation of false network topology  IP Address Spoofing- false source addressing on malicious packets  Identity & Resource ID Vulnerability
  • 11. Transport Layer Vulnerabilities  Mishandling of undefined, poorly defined, or “illegal” conditions  Differences in transport protocol implementation allow “fingerprinting’ and otherenumeration of host information  Overloading of transport-layer mechanisms such as port numbers limit the abilityto effectively filter and qualify traffic.  Transmission mechanisms can be subject to spoofing and attack based oncrafted packets.
  • 12. Session Layer Vulnerabilities  Weak or non-existent authentication mechanisms  Session identification may be subject to spoofing and hijack  Leakage of information based on failed authentication attempts  Unlimited failed sessions allow brute-force attacks on access credentials
  • 13. Presentation Layer Vulnerabilities  Poor handling of unexpected input can lead to application crashes or surrender of control to execute arbitrary instructions.  Unintentional or ill-advised use of externally supplied input in control contexts may allow remote manipulation or information leakage.  Cryptographic flaws may be exploited to circumvent privacy protections .
  • 14. Application Layer Vulnerabilities  Open design issues allow free use of application resources by unintended parties  Backdoors and application design flaws bypass standard security controls  Inadequate security controls force “all-or-nothing” approach, resulting in either excessive or insufficient access.
  • 20. Connection-oriented service  TCP – Transmission Control Protocol  TCP Service [ RFC 793 ]  Reliable, in-order byte stream data transfer  Flow control  Congestion control
  • 21. Connection-oriented service  TCP handshaking :  Setup (prepare for) data transfer ahead of time
  • 22. Connection-oriented service  TCP – Transmission Control Protocol  TCP Service [ RFC 793 ]  Reliable, in-order byte stream data transfer  Flow control  Congestion control
  • 23. Connectionless  UDP – User Datagram Protocol  UDP Service [ RFC 768 ]  Unreliable data transfer  No flow control  No congestion control
  • 24. Internet  Internet “millions of connected computing devices : hosts, end-system”  Internet “ network of networks”  Internet standard :  RFC : Request for comments  IETF : Internet Engineering Task Force
  • 25. Common Network Protocol  Protocols – control sending, receiving of messages  Example :  TCP  IP  HTTP  FTP  PPP
  • 26. Application Layer Protocols  Application : communicating, distributed processes  Application-layer protocols :  One “piece” of an application  Define messages exchanged by applications and action taken  Use communication services provided by lower layer (TCP, UDP)  Types of messages exchanged
  • 27. Application Layer Protocols  Public domain protocols :  Defined in RFCs  Allows for interoperability  Example : HTTP, SMTP  Proprietary protocols :  Skype  MS Exchange  VTP
  • 28. Network Application  Typical network application has two pieces : client and server  Client :  Initiates contact with server  Typically request services from server  Web : client implemented in browser  Email : in mail reader
  • 29. Network Application  Server:  Provides requested service to client  Example :  Web server send requested web page
  • 30. Internet Apps : application, transport protocols Application App Layer Protocol Transport Protocol Email SMTP [RFC 2821] TCP Remote Terminal Access Telnet [RFC 854] TCP Web HTTP [RFC 2616] TCP File transfer FTP [RFC 959] TCP Streaming multimedia Proprietary TCP and UDP