Network Fundamentals
Task 1
1.What is Networking?
Networks are simply things connected. For example, your friendship circle: you are all connected because of similar interests, hobbies, skills and sorts.
Networks can be found in all walks of life:
- A city’s public transportation system
- Infrastructure such as the national power grid for electricity
- Meeting and greeting your neighbours
- Postal systems for sending letters and parcels
But more specifically, in computing, networking is the same idea, just dispersed to technological devices. Take your phone as an example; the reason that you have it is to access things. We’ll cover how these devices communicate with each other and the rules that follow.
In computing, a network can be formed by anywhere from 2 devices to billions. These devices include everything from your laptop and phone to security cameras, traffic lights and even farming!
Networks are integrated into our everyday life. Be it gathering data for the weather, delivering electricity to homes or even determining who has the right of way at a road. Because networks are so embedded in the modern-day, networking is an essential concept to grasp in cybersecurity.
Take the diagram below as an example, Alice, Bob and Jim have formed their network! We’ll come onto this a bit later on.
What is the key term for devices that are connected together?
Ans: Network
2.What is the Internet?
The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks — a network of networks in which users at any one computer can, if they have permission, get information from any other computer .
Who invented the World Wide Web?
Ans: Tim Berners-Lee
3.Identifying Devices on a Network
Devices on a network are very similar to humans in the fact that we have two ways of being identified:
- Our Name
- Our Fingerprints
Now we can change our name through deed poll, but we can’t, however, change our fingerprints. Every human has an individual set of fingerprints which means that even if they change their name, there is still an identity behind it. Devices have the same thing: two means of identification, with one being permeable. These are:
- An IP Address
- A Media Access Control (MAC) Address — think of this as being similar to a serial number.
What does the term “IP” stand for?
Ans:Internet ProtocolWhat is each section of an IP address called?
Ans:OctetHow many sections (in digits) does an IP address have?
Ans:4What does the term “MAC” stand for?
Ans:Media Access Control
Deploy the interactive lab using the “View Site” button and spoof your MAC address to access the site. What is the flag?
Ans: After Spoofing the mac address you will get the flag which is the ans of this question. To spoof MAC make a both device same MAC address.
Task 4. Ping (ICMP)
Ping is one of the most fundamental network tools available to us. Ping uses ICMP (Internet Control Message Protocol) packets to determine the performance of a connection between devices, for example, if the connection exists or is reliable.
What protocol does ping use?
Ans: PingWhat is the syntax to ping 10.10.10.10?
Ans: Ping 10.10.10.10What flag do you get when you ping 8.8.8.8?
Ans: Ping 8.8.8.8 look towards the output you will get the flag which start from THM{}.
Chapter 2 Intro to Lan
Task 1
Introducing LAN Topologies
What does LAN stand for?
Ans: Local Area NetworkWhat is the verb given to the job that Routers perform?
Ans: RoutingWhat technology do Switches use to break large pieces of data into smaller, more manageable packets?
Ans:Packet SwitchingWhat topology is cost-efficient to set up?
Ans:Bus TopologyWhat topology is expensive to set up and maintain?
Ans:Star Topology
Complete the interactive lab attached to this task. What is the flag given at the end?
Ans:THM{TOPOLOGY_FLAWS}
Task 2
A Primer on Subnetting
What is the technical term for dividing a network up into smaller pieces?
Ans:SubnettingHow many bits are in a subnet mask?
Ans:30What is the range of a section (octet) of a subnet mask?
Ans:0–255What address is used to identify the start of a network?
Ans:Network AddressWhat address is used to identify devices within a network?
Ans:Host AddressWhat is the name used to identify the device responsible for sending data to another network?
Ans:Default Gateway
Task 2
The ARP Protocol
What does ARP stand for?
Ans:Address Resolution ProtocolWhat category of ARP Packet asks a device whether or not it has a specific IP address?
Ans:RequestWhat address is used as a physical identifier for a device on a network?
Ans:MAC AddressWhat address is used as a logical identifier for a device on a network?
Ans:IP Address
Task 4
The DHCP Protocol
What type of DHCP packet is used by a device to retrieve an IP address?
Ans:DHCP DiscoverWhat type of DHCP packet does a device send once it has been offered an IP address by the DHCP server?
Ans:DHCP RequestFinally, what is the last DHCP packet that is sent to a device from a DHCP server?
Ans:DHCP ACK
Chapter 3
OSI Model
Task 1 What is the OSI Model?
What does the “OSI” in “OSI Model” stand for?
Ans:Open Systems InterconnectionHow many layers (in digits) does the OSI model have?
Ans:7What is the key term for when pieces of information get added to data?
Ans: Encapsulation
Task 2 Layer 7 — Application
What is the name of this Layer?
Ans:ApplicationWhat is the technical term that is given to the name of the software that users interact with?
Ans: Graphical User Interface
Taks 3 Layer 6 — Presentation
What is the name of this Layer?
Ans: PresentationWhat is the main purpose that this Layer acts as?
Ans:Translator
Task 4 Layer 5 — Session
What is the name of this Layer?
Ans:SessionWhat is the technical term for when a connection is successfully established?
Ans:SessionWhat is the technical term for “small chunks of data”?
Ans:Packets
Task 5 Layer 4 — Transport
What is the name of this Layer?
Ans: TransportWhat does TCP stand for?
Ans: Transmission Control ProtocolWhat does UDP stand for?
Ans:User Datagram ProtocolWhat protocol guarantees the accuracy of data?
Ans:TCPWhat protocol doesn’t care if data is received or not by the other device?
Ans: UDPWhat protocol would an application such as an email client use?
Ans:TCPWhat protocol would an application that downloads files use?
Ans: TCPWhat protocol would an application that streams video use?
Ans:UDP
Task 6 Layer 3 — Network
What is the name of this Layer?
Ans:NetworkWill packets take the most optimal route across a network? (Y/N)
Ans:YWhat does the acronym “OSPF” stand for?
Ans:Open Shortest Path FirstWhat does the acronym “RIP” stand for?
Ans: Routing Information ProtocolWhat type of addresses are dealt with at this layer?
Ans:IP Addresses
Task 7 Layer 2 — Data Link
What is the name of this Layer?
Ans: Data LinkWhat is the name of the piece of hardware that all networked devices come with?
Ans:Network Interface Card
Task 8 Layer 1 — Physical
What is the name of this Layer?
Ans: PhysicalWhat is the name of the numbering system that is both 0’s and 1's?
Ans: BinaryWhat is the name of the cables that are used to connect devices?
Ans: Ethernet Cables
Task 9 Practical — OSI Game
Escape the dungeon to retrieve the flag. What is the flag?
Ans: Use your cursor keys to move left and right and the space bar to enter doors enter with the Layer wise step by step. You will get the flag look like THM{}
Chapter Packets & Frames
Task 1 What are Packets and Frames
What is the name for a piece of data when it does have IP addressing information?
Ans:FrameWhat is the name for a piece of data when it does not have IP addressing information?
Ans:Packet
Task 2 TCP/IP (The Three-Way Handshake)
What is the header in a TCP packet that ensures the integrity of data?
Ans:checksumProvide the order of a normal Three-way handshake (with each step separated by a comma)
Ans:SYN,SYN/ACK,ACKTask 3 Practical — Handshake
What is the value of the flag given at the end of the conversation?
Ans: View the site and than Click SYN,SYN/ACK,ACK,DATA,ACK,FIN/ACK,FIN/ACK,ACK to get the flag that was the answer.Task 4 UDP/IP
What does the term “UDP” stand for?
Ans:User Datagram ProtocolWhat type of connection is “UDP”?
Ans:statelessWhat protocol would you use to transfer a file?
Ans:TCPWhat protocol would you use to have a video call?
Ans:UDP
Task 5 Ports 101 (Practical)
What is the flag received from the challenge?
Ans: Click on View Site and Type IP Address 8.8.8.8 and Port 1234.Click on Connect the flag is display starting from THM{}.
Chapter 5
Task 1 Introduction to Port Forwarding
What is the name of the device that is used to configure port forwarding?
Ans: Router
Task 2 Firewalls 101
What layers of the OSI model do firewalls operate at?
Ans:Layer 3,Layer 4What category of firewall inspects the entire connection?
Ans:StatefulWhat category of firewall inspects individual packets?
Ans:StatelessTask 3 Practical — Firewall
What is the flag?
Ans: Click on View Site
Setup the Source IP 198.51.100.34
Destination IP 203.0.101.1
Port 80
Action : Drop ,Click on Add Rule wait 30sec you will get the flag.
Task 4 VPN Basics
What VPN technology only encrypts & provides the authentication of data?
Ans:PPPWhat VPN technology uses the IP framework?
Ans:IPSec
Task 5 LAN Networking Devices
What is the verb for the action that a router does?
Ans: RoutingWhat are the two different layers of switches? Separate these by a comma I.e.: LayerX, LayerY?
Ans:Layer2,Layer3
End of Network Fundamental Path.
Ping me Instagram.
Next. Module