ch3- network& scanning - Hands-On Ethical Hacking and...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Hands-On Ethical Hacking and Network Defense TCP/IP Concepts Review
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the binary, octal, and hexadecimal numbering system 2
Background image of page 2
Overview of TCP/IP Protocol Common language used by computers for speaking Transmission Control Protocol/Internet Protocol (TCP/IP) Most widely used protocol TCP/IP stack Contains four different layers Network Internet Transport Application 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4
Background image of page 4
The Application Layer Front end to the lower-layer protocols What you can see and touch – closest to the user at the keyboard HTTP, FTP, SMTP, SNMP, SSH, IRC and TELNET all operate in the Application Layer 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6
Background image of page 6
The Transport Layer Encapsulates data into segments Segments can use TCP or UDP to reach a destination host TCP is a connection-oriented protocol TCP three-way handshake Computer A sends a SYN packet Computer B replies with a SYN-ACK packet Computer A replies with an ACK packet 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TCP Ports Port Logical, not physical, component of a TCP connection Identifies the service that is running Example: HTTP uses port 80 A 16-bit number – 65,536 ports Each TCP packet has a source and destination port 8
Background image of page 8
Blocking Ports Blocking Ports Helps you stop or disable services that are not needed Open ports are an invitation for an attack
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 29

ch3- network& scanning - Hands-On Ethical Hacking and...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online