Tryhackme Pre Security Walk-Through- Network Fundamentals

Febrero
7 min readJul 10, 2021

--

Network Fundamentals

Network Fundamentals

Task 1

1.What is Networking?
Networks are simply things connected. For example, your friendship circle: you are all connected because of similar interests, hobbies, skills and sorts.
Networks can be found in all walks of life:

  • A city’s public transportation system
  • Infrastructure such as the national power grid for electricity
  • Meeting and greeting your neighbours
  • Postal systems for sending letters and parcels

But more specifically, in computing, networking is the same idea, just dispersed to technological devices. Take your phone as an example; the reason that you have it is to access things. We’ll cover how these devices communicate with each other and the rules that follow.

In computing, a network can be formed by anywhere from 2 devices to billions. These devices include everything from your laptop and phone to security cameras, traffic lights and even farming!

Networks are integrated into our everyday life. Be it gathering data for the weather, delivering electricity to homes or even determining who has the right of way at a road. Because networks are so embedded in the modern-day, networking is an essential concept to grasp in cybersecurity.

Take the diagram below as an example, Alice, Bob and Jim have formed their network! We’ll come onto this a bit later on.

What is the key term for devices that are connected together?
Ans: Network

2.What is the Internet?

The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks — a network of networks in which users at any one computer can, if they have permission, get information from any other computer .

Who invented the World Wide Web?
Ans: Tim Berners-Lee

3.Identifying Devices on a Network

Devices on a network are very similar to humans in the fact that we have two ways of being identified:

  • Our Name
  • Our Fingerprints

Now we can change our name through deed poll, but we can’t, however, change our fingerprints. Every human has an individual set of fingerprints which means that even if they change their name, there is still an identity behind it. Devices have the same thing: two means of identification, with one being permeable. These are:

  • An IP Address
  • A Media Access Control (MAC) Address — think of this as being similar to a serial number.

What does the term “IP” stand for?
Ans:Internet Protocol

What is each section of an IP address called?
Ans:Octet

How many sections (in digits) does an IP address have?
Ans:4

What does the term “MAC” stand for?
Ans:Media Access Control

Deploy the interactive lab using the “View Site” button and spoof your MAC address to access the site. What is the flag?
Ans: After Spoofing the mac address you will get the flag which is the ans of this question. To spoof MAC make a both device same MAC address.

Task 4. Ping (ICMP)
Ping is one of the most fundamental network tools available to us. Ping uses ICMP (Internet Control Message Protocol) packets to determine the performance of a connection between devices, for example, if the connection exists or is reliable.

What protocol does ping use?
Ans: Ping

What is the syntax to ping 10.10.10.10?
Ans: Ping 10.10.10.10

What flag do you get when you ping 8.8.8.8?
Ans: Ping 8.8.8.8 look towards the output you will get the flag which start from THM{}.

Chapter 2 Intro to Lan

Task 1
Introducing LAN Topologies

What does LAN stand for?
Ans: Local Area Network

What is the verb given to the job that Routers perform?
Ans: Routing

What technology do Switches use to break large pieces of data into smaller, more manageable packets?
Ans:Packet Switching

What topology is cost-efficient to set up?
Ans:Bus Topology

What topology is expensive to set up and maintain?
Ans:Star Topology
Complete the interactive lab attached to this task. What is the flag given at the end?
Ans:THM{TOPOLOGY_FLAWS}

Task 2
A Primer on Subnetting

What is the technical term for dividing a network up into smaller pieces?
Ans:Subnetting

How many bits are in a subnet mask?
Ans:30

What is the range of a section (octet) of a subnet mask?
Ans:0–255

What address is used to identify the start of a network?
Ans:Network Address

What address is used to identify devices within a network?
Ans:Host Address

What is the name used to identify the device responsible for sending data to another network?
Ans:Default Gateway

Task 2
The ARP Protocol

What does ARP stand for?
Ans:Address Resolution Protocol

What category of ARP Packet asks a device whether or not it has a specific IP address?
Ans:Request

What address is used as a physical identifier for a device on a network?
Ans:MAC Address

What address is used as a logical identifier for a device on a network?
Ans:IP Address

Task 4
The DHCP Protocol

What type of DHCP packet is used by a device to retrieve an IP address?
Ans:
DHCP Discover

What type of DHCP packet does a device send once it has been offered an IP address by the DHCP server?
Ans:DHCP Request

Finally, what is the last DHCP packet that is sent to a device from a DHCP server?
Ans:DHCP ACK

Chapter 3
OSI Model

Task 1 What is the OSI Model?

What does the “OSI” in “OSI Model” stand for?
Ans:Open Systems Interconnection

How many layers (in digits) does the OSI model have?
Ans:7

What is the key term for when pieces of information get added to data?
Ans: Encapsulation

Task 2 Layer 7 — Application

What is the name of this Layer?
Ans:Application

What is the technical term that is given to the name of the software that users interact with?
Ans: Graphical User Interface

Taks 3 Layer 6 — Presentation

What is the name of this Layer?
Ans: Presentation

What is the main purpose that this Layer acts as?
Ans:Translator

Task 4 Layer 5 — Session

What is the name of this Layer?
Ans:Session

What is the technical term for when a connection is successfully established?
Ans:Session

What is the technical term for “small chunks of data”?
Ans:Packets

Task 5 Layer 4 — Transport

What is the name of this Layer?
Ans: Transport

What does TCP stand for?
Ans: Transmission Control Protocol

What does UDP stand for?
Ans:User Datagram Protocol

What protocol guarantees the accuracy of data?
Ans:TCP

What protocol doesn’t care if data is received or not by the other device?
Ans: UDP

What protocol would an application such as an email client use?
Ans:TCP

What protocol would an application that downloads files use?
Ans: TCP

What protocol would an application that streams video use?
Ans:UDP

Task 6 Layer 3 — Network

What is the name of this Layer?
Ans:Network

Will packets take the most optimal route across a network? (Y/N)
Ans:Y

What does the acronym “OSPF” stand for?
Ans:Open Shortest Path First

What does the acronym “RIP” stand for?
Ans: Routing Information Protocol

What type of addresses are dealt with at this layer?
Ans:IP Addresses

Task 7 Layer 2 — Data Link

What is the name of this Layer?
Ans: Data Link

What is the name of the piece of hardware that all networked devices come with?
Ans:Network Interface Card

Task 8 Layer 1 — Physical

What is the name of this Layer?
Ans: Physical

What is the name of the numbering system that is both 0’s and 1's?
Ans: Binary

What is the name of the cables that are used to connect devices?
Ans: Ethernet Cables

Task 9 Practical — OSI Game

Escape the dungeon to retrieve the flag. What is the flag?
Ans: Use your cursor keys to move left and right and the space bar to enter doors enter with the Layer wise step by step. You will get the flag look like THM{}

Chapter Packets & Frames
Task 1 What are Packets and Frames

What is the name for a piece of data when it does have IP addressing information?
Ans:Frame

What is the name for a piece of data when it does not have IP addressing information?
Ans:Packet

Task 2 TCP/IP (The Three-Way Handshake)

What is the header in a TCP packet that ensures the integrity of data?
Ans:checksum

Provide the order of a normal Three-way handshake (with each step separated by a comma)
Ans:SYN,SYN/ACK,ACK

Task 3 Practical — Handshake
What is the value of the flag given at the end of the conversation?
Ans: View the site and than Click SYN,SYN/ACK,ACK,DATA,ACK,FIN/ACK,FIN/ACK,ACK to get the flag that was the answer.

Task 4 UDP/IP
What does the term “UDP” stand for?
Ans:User Datagram Protocol

What type of connection is “UDP”?
Ans:stateless

What protocol would you use to transfer a file?
Ans:TCP

What protocol would you use to have a video call?
Ans:UDP

Task 5 Ports 101 (Practical)

What is the flag received from the challenge?
Ans: Click on View Site and Type IP Address 8.8.8.8 and Port 1234.Click on Connect the flag is display starting from THM{}.

Chapter 5
Task 1 Introduction to Port Forwarding

What is the name of the device that is used to configure port forwarding?
Ans: Router

Task 2 Firewalls 101

What layers of the OSI model do firewalls operate at?
Ans:Layer 3,Layer 4

What category of firewall inspects the entire connection?
Ans:Stateful

What category of firewall inspects individual packets?
Ans:Stateless

Task 3 Practical — Firewall

What is the flag?
Ans: Click on View Site
Setup the Source IP 198.51.100.34
Destination IP 203.0.101.1
Port 80
Action : Drop ,Click on Add Rule wait 30sec you will get the flag.

Task 4 VPN Basics

What VPN technology only encrypts & provides the authentication of data?
Ans:PPP

What VPN technology uses the IP framework?
Ans:IPSec

Task 5 LAN Networking Devices

What is the verb for the action that a router does?
Ans: Routing

What are the two different layers of switches? Separate these by a comma I.e.: LayerX, LayerY?
Ans:Layer2,Layer3

End of Network Fundamental Path.

Ping me Instagram.

Next. Module

--

--