šŸ”“
PURPLEBYTEONE
  • main
  • Notes
    • Education
      • Base
        • Information Technology
          • OpenText
            • Courses
              • Security and Forensics
                • EnCaseā„¢ eDiscovery Series
                  • ED290 - eDiscovery Training with EnCase Information Assurance
                • EnCaseā„¢ Crossover Series
                  • DFIR450 - EnCase EnScript Programming
                  • DFIR370 - Host Intrusion Methodology and Investigation
                  • DFIR350 - Internet-based Investigations
                  • DFIR130 - EnCase Endpoint Investigator
                • EnCaseā„¢ Incident Response Series
                  • IR280 - EnCase Endpoint Security
                  • IR250 - Incident Investigation
                • EnCaseā„¢ Digital Forensics Series
                  • DF420 - Mac Examinations
                  • DF410 - NTFS Examinations
                  • DF320 - Advanced Analysis of Windows Artifacts
                  • DF310 - EnCase Certified Examiner
                  • DF210 - Building an Investigation
                  • DF125 - Mobile Device Examinations
                  • DF120 - Foundations in Digital Forensics
              • Business Network
              • Digital Process Automation
              • Platform Solutions
              • Discovery
              • Digital Experience
              • Analytics
              • Enterprise Content Management
          • Harvard University
            • CS 50
          • LPI
            • Courses
              • Essentials
                • Linux Essentials: 010
                • Security Essentials: 020
                • Web Development Essentials: 030
              • Professional
                • LPIC-1
                  • 101
                  • 102
                • LPIC-2
                  • 201
                  • 202
                • LPIC-3
                  • 300
                  • 303
                  • 305
                  • 306
          • Cloud Orchestration
            • Docker
            • Kubernetes
              • KCNA
              • CKA
              • CKS
          • Google Cloud
            • Path
              • Google Cloud Computing Foundations
              • Network Engineer Learning Path
              • Database Engineer Learning Path
              • Cloud Engineer Learning Path
              • Security Engineer Learning Path
              • Cloud Architect Learning Path
              • Cloud Developer Learning Path
          • VMware
            • Courses
              • Carbon Black
                • Professional
                  • Endpoint Security: Core Technical Skills
                  • App Control Administrator
                  • EDR Administrator
                • Advanced
                  • App Control Advanced Administrator
                  • Advanced Operations and Troubleshooting
                  • Audit and Remediation
                  • Endpoint Standard
                  • Enterprise EDR
                  • EDR Advanced Administrator
                  • EDR Advanced Analyst
          • Amazon
            • Courses
              • Foundation
                • AWS Certified Cloud Practitioner
              • Associate
                • AWS Certified Solutions Architect
              • Professional
                • AWS Certified Solutions Architect
              • Speciality
                • AWS Certified Advanced Networking
                • AWS Certified Security – Specialty
          • Microsoft
            • Courses
              • Azure
                • AZ - 900
                • AZ - 104
                • AZ - 305
                • SC - 900
                • SC - 200
                • SC - 300
                • AZ - 500
                • MS-500
                • SC - 400
                • SC - 100
          • The Code
            • Platform
              • FreeCodeCamp
              • W3
            • Language
              • Python
              • PowerShell
              • JavaScript
              • PHP
              • SQL
              • GO
              • Java
              • Perl
              • Ruby
              • Scala
              • C
              • C#
              • C++
              • Brainfuck
              • CSS
              • JSON
              • Kotlin
              • LOLCODE
              • MISP
              • MongoDB
              • Objective-C
              • Perl
              • Rust
              • SAAS
              • Scala
              • Solidity
              • SWIFT
              • TypeScript
              • WebAssembly
              • XML
              • YAML
              • AngularJS
              • Ansible
              • BASH
              • Docker
              • GIT
              • jQuery
              • VIM
          • OKTA
        • Purple Team
          • Splunk
            • Courses
              • Udemy
            • Notes
          • Security Team Blue
            • Courses
              • BTL v1
              • BTL v2
          • ISC2
            • CC
              • Introduction
              • Security Principles
                • Security Concepts of Information Assurance
                • Risk Management Process
                • Security Controls
                • Governance Elements and Processes
                • Terms and Definitions
              • Incident Response
                • Understand Incident Response
                • Business Continuity
                • Disaster Recovery
              • Access Control Concepts
                • Access Control Concepts
                • Physical Access Controls
                • Logical Access Controls
              • Network Security
                • Computer Networking
                • Threats and Attacks
                • Network Security Infrastructure
              • Security Operations
            • SSCP
            • CISSP
            • CCSP
          • TCM Security
            • Courses
              • Python 101
              • Python 201
              • Linux 101
              • External Pentest Playbook
              • Windows Privilege Escalation
              • Linux Privilege Escalation
              • Movement, Pivoting and Persistence
              • Practical Phishing Assessments
              • Practical Web Application Security
              • Practical Malware Analysis
              • Mobile
              • (OSINT) Fundamentals
              • PEH
            • Certification
              • PNPT
              • PJMR
          • Coursera
            • Courses
              • NYU
                • Introduction to Cyber Security Specialization
              • Google
                • Google Cybersecurity Professional
                  • Foundations of Cybersecurity
                  • Play It Safe: Manage Security Risks
                  • Connect and Protect: Networks and Network Security
                  • Tools of the Trade: Linux and SQL
                  • Assets, Threats, and Vulnerabilities
                  • Sound the Alarm: Detection and Response
                  • Automate Cybersecurity Tasks with Python
                  • Put It to Work: Prepare for Cybersecurity Jobs
          • ICSI Global
          • OccupyTheWeb
            • Courses
              • GSBMH
              • NBFH
              • LBFH
          • CompTIA
            • Courses
              • Core Base
                • A+
                  • Chapter 1
                • Network+
                  • Chapter 1
                • Linux+
                  • Chapter 1
                  • Chapter 2
                • Cloud+
                  • Chapter 1
              • Security
                • Security+
                  • Chapter 1
                    • Risk Terminology
                • Pentest+
                  • Chapter 1
                • CySA+
                  • Chapter 1
                • CSA+
                  • Defending Against Cybersecurity Threats
          • EC-Council
            • Courses
              • CEH
              • CHFI
              • CSA
          • Intel Techniques
            • Courses
              • OSINT Techniques
              • Privacy & Security
          • SANS
            • Courses
              • SEC
                • SEC 401 - Security Essentials
                • SEC 450 - Blue Team Fundamentals
                • SEC 502 - Perimeter Protection In-Depth
                • SEC 503 - Network Monitoring and Threat Detection In-Depth
                • SEC 504 - Hackers Tools, Techniques And Incident Handling
                • SEC 505 - Securing Windows and PowerShell Automation
                • SEC 506 - Securing Linux & UNIX
                • SANS 509 - Securing Oracle Database
                • SEC 511 - Continuous Monitoring and Security Operations
                • SEC 517 - Cutting Edge Hacking Techniques
                • SEC 524 - Cloud Security Fundamentals
                • SEC 531 - Windows Command Line Kung Fu
                • SEC 542 - Web App Penetration Testing
                • SEC 560 - Enterprise Penetration Testing
                • SEC 565 - Red Team Operations and Adversary Emulation
                • SEC 566 - Implementing and Auditing Security Frameworks
                • SEC 573 - Automating Information Security with Python
                • SEC 575: Mobile Device Security
                • SEC 580 - Metasploit for Enterprise Penetration Testing
                • SEC 587 - Advanced Open Source Intelligence
                • SEC 599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
                • SEC 617 - Wireless Penetration Testing and Ethical Hacking
                • SEC 642 - Advanced Web App Penetration Testing
                • SEC 660 - Advanced Penetration Testing
                • SEC 760 - Advanced Exploit Development
                • SEC 554: Blockchain and Smart Contract Security
              • FOR
                • FOR 408 - Windows Forensic Analysis
                • FOR 500 - Windows Forensic Analysis
                • FOR 508 - Advanced Digital Forensics and Incident Response
                • FOR 518 - Mac and iOS Forensic Analysis
                • FOR 526 - Memory Forensics In-Depth
                • FOR 572 - Advanced Network Forensics
                • FOR 577 - Virtualization Security Fundamentals
                • FOR 578 - Cyber Threat Intelligence
                • FOR 610 - Reverse-Engineering Malware
                • FOR 710 - Reverse-Engineering Malware: Advanced Code Analysis
              • AUD
                • AUD 507 - Auditing Systems, Applications, and the Cloud
              • ICS
                • ICS 410 - ICS/SCADA Security Essentials
              • MGT
                • MGT 512 - Security Leadership Essentials for Managers
          • IBM
            • Courses
              • Cybersecurity Analyst Professional
                • Introduction to Cybersecurity Tools & Cyber Attacks
                  • Week 1
                  • Week 2
                  • Week 3
                  • Week 4
          • Cybrary
            • Courses
              • SOC L1
              • SOC L2
              • SOC L3
              • Become an Incident Handler
          • Zero Point Security
            • Courses
              • Red Team Ops [CRTO]
              • C2 Development in C#
          • Web Security Academy
            • Courses
              • Burp Suite Certified Practitioner
          • INE
            • Courses
              • eJPT
                • Blue Team
                  • ePND
                  • eCIR
                  • eCRE
                  • ePWD
                  • eCTHPv2
                  • eCDFP
                  • eCMAP
                • Red Team
                  • eMAPT
                  • eWPT
                  • eCPPTv2
                  • eCXD
                  • eWPTXv2
                  • eCPTXv2
          • Pentester Lab
          • Pentester Academy
            • Courses
              • Pentesting with Metasploit: Beginner Edition
              • Linux Privilege Escalation
          • Offensive Security
            • Courses
              • Fundamental
                • Introduction to Secure Software Development
                • Introduction to Cloud Security
                • Exploit Development Essentials
                • Web Application Assessment Essentials
                • Security Operations Essentials
                • Network Penetration Testing Essentials
              • Security Operations
                • SOC-200: Foundational Security Operations and Defensive Analysis (OSDA)
              • Penetration Testing
                • PEN - 200
                • PEN - 210
                • PEN - 300
              • Web Application
                • WEB-200: Foundational Web Application Assessments with Kali Linux (OSWA)
                • WEB-300: Advanced Web Attacks and Exploitation (OSWE)
              • Exploit Development
                • EXP-301: Windows User Mode Exploit Development (OSED)
                • EXP-312: Advanced macOS Control Bypasses (OSMR)
                • EXP-401: Advanced Windows Exploitation (OSEE)
          • Sektor7
            • Courses
              • Windows Privilege Escalation
              • Windows Persistence
              • Malware Development Essentials
              • Evasion Windows Red Team Ops
          • Black Hat
            • Courses
              • BlackHat - Malware Analysis And Memory Forensics
          • Fortinet
          • VHL
          • DFIRdiva
          • YouTube
            • Channels
          • Udemy
            • Certified in Cybersecurity (CC)
            • CompTIA Security+
          • AntiSyphon
          • THM
            • Room
              • SPLUNK
                • Introduction to SIEM
                • Basics
                • Incident handling
                • Investigating
                • Benign
                • ELK 101
                • PS Eclipse
                • New Hire Old Artifacts
                • Conti
                • BOTS
                  • v1
                  • v2
                  • v3
                • ItsyBitsy
            • Learning Paths
              • Introduction to Cyber Security
                • Introduction to Cyber Security
                  • Intro to Offensive Security
                  • Intro to Defensive Security
                • Introduction to Offensive Security
                • Introduction to Defensive Security
          • HTB
            • HTB Academy
              • Job Role Path
                • Penetration Tester
                  • Getting Started
                    • Infosec Overview
                    • Getting Started with a Pentest Distro
                    • Staying Organized
                    • Connecting Using VPN
                    • Common Terms
                  • Machines
                    • Nibbles
                • SOC Analyst
                  • Incident Handling Process
                    • Incident Handling
                    • Cyber Kill Chain
                    • Incident Handling Process Overview
                      • Preparation Stage
                      • Detection & Analysis Stage
                      • Containment, Eradication, & Recovery Stage
                      • Post-Incident Activity Stage
                  • Security Monitoring & SIEM Fundamentals
                  • Windows Event Logs & Finding Evil
                  • Introduction to Threat Hunting & Hunting With Elastic
                  • Understanding Log Sources & Investigating with Splunk
                  • Windows Attacks & Defense
                  • Intro to Network Traffic Analysis
                  • Intermediate Network Traffic Analysis
                  • Working with IDS/IPS
                  • Introduction to Malware Analysis
                  • JavaScript Deobfuscation
                  • YARA & Sigma for SOC Analysts
                  • Introduction to Digital Forensics
                  • Detecting Windows Attacks with Splunk
                  • Security Incident Reporting
            • Challenges
              • Retired
                • Challenges
                  • Hardware
                    • Very Easy
                      • Gawk
                      • Secure Digital
                  • Web
                    • Very Easy
                      • Trapped Source
                  • Mobile
                    • Very Easy
                      • Don't Overreact
                  • Pwn
                    • Very Easy
                      • Getting Started
                      • Questionnaire
                      • Vault-breaker
                  • Crypto
                    • Very Easy
                      • Ancient Encodings
                  • Reverse
                    • Very Easy
                      • WIDE
                      • Shattered Tablet
                      • Hunting License
                      • Gonna-Lift-Em-All
                  • Misc
                    • Very Easy
                      • Compressor
                  • Forensics
                    • Very Easy
                      • Extraterrestrial Persistence
                      • Alien Cradle
                      • Wrong Spooky Season
                  • OSINT
                  • GamePwn
                  • Blockchain
            • Machines
              • Retired
                • Windows
                  • Easy
                    • Blue
          • Blueteamlabs.online
          • LetsDefend.io
          • CyberDefenders.org
      • Infinity
        • c0//53
          • Leet Code
          • Hacker Rank
        • Tools
          • Red Team
            • OSINT
            • Enumeration
            • Web
            • Exploit Base
              • Linux
            • Post-exploitation
              • Backdoor
          • Blue Team
            • Forensics
            • My scripts
        • Bookmarks
          • Cybersecurity
            • Reverse Engineering
            • Telegram
          • MindHub
            • Job Boards
          • GitHub
          • AI
            • Free
          • Books
            • Cybersecurity
              • Linux
                • Linux Essentials For Cybersecurity
                • The Linux Command Line, 2nd Edition: A Complete Introduction
                • How Linux Works, 3rd Edition: What Every Superuser Should Know
              • OSINT
                • Deep Dive: Exploring the Real-world Value of Open Source Intelligence
              • Networking
                • Wireshark for Security Professionals
              • Social Engineering
                • Practical Social Engineering
          • Writeups
    • Carrier
      • Interview Questions
        • General HR questions
        • Cybersecurity
          • Junior Positions
            • SOC L1
            • Junior Malware Analyst
            • Junior Penetration Tester
            • Junior Red Teamer
            • Junior Forensic Analyst
            • Junior Incident responder
            • Junior Threat hunter
            • Junior Security Analyst
          • Specialist Positions
            • SOC L2
            • Malware Analyst
            • Penetration Tester
            • Red Teamer
            • Forensic Analyst
            • Incident responder
            • Threat hunter
            • Security Analyst
          • Senior Positions
            • SOC L3
            • Senior Malware Analyst
            • Senior Penetration Tester
            • Senior Red Teamer
            • Senior Forensic Analyst
            • Senior Incident responder
            • Senior Threat hunter
            • Senior Security Analyst
          • Random questions
            • PT.1
            • PT.2
            • PT.3
            • PT.4
            • PT.5
            • PT.6
    • Note
      • Read
      • Interview
      • Cheat Sheet
        • Penetration Testing
          • Enumeration
  • Roadmap
    • CTF Track
Powered by GitBook
On this page
  • Open Systems Interconnection (OSI) Model
  • Transmission Control Protocol/Internet Protocol (TCP/IP)
  1. Notes
  2. Education
  3. Base
  4. Purple Team
  5. ISC2
  6. CC
  7. Network Security

Computer Networking

A network is simply two or more computers linked together to share data, information or resources.

There are two basic types of networks:

  • Local area network (LAN) - A local area network (LAN) is a network typically spanning a single floor or building. This is commonly a limited geographical area.

  • Wide area network (WAN) - Wide area network (WAN) is the term usually assigned to the long-distance connections between geographically remote networks.

Network Devices:

  • Hub

    • Hubs are used to connect multiple devices in a network.

    • They’re less likely to be seen in business or corporate networks than in home networks.

    • Hubs are wired devices and are not smart and are retransmitting data to all devices.

  • Switch

    • Are wired devices that know the addresses of the devices connected to them and route traffic to that port/device rather than retransmitting to all devices.

    • Can also create separate broadcast domains when used to create VLANs

  • Router

    • Are used to control traffic flow on networks

    • Used to connect similar networks and control traffic flow between them

    • Can be wired

    • Can be wireless

    • Can connect multiple switches

    • Smarter than hub

    • Smarten than switch

    • Determine the most efficient ā€œrouteā€ for the traffic to flow across the network

  • Firewall

    • Managing network traffic

    • Controlling network traffic

    • Protecting the network

    • A firewall is a network device used to filter traffic.

    • Typically deployed between a private network and the internet

    • Can also be deployed between departments (segmented networks) within an organization (overall network).

    • Filters traffic based on a defined set of rules

      • called filters or access control lists

  • Server

    • A computer that provides information to other computers on a network

    • Some common servers are networked and accessed in some way by a client computer:

      • web servers

      • email servers

      • print servers

      • database servers

      • file servers

    • Secured differently than workstations to protect the information they contain

  • Endpoint

    • The ends of a network communication link.

    • One end is often at a server where a resource resides

    • Other end is often a client making a request to use a network resource

    • An endpoint can be another

      • server

      • desktop workstation

      • laptop

      • tablet

      • mobile phone

      • any other end user device

Ethernet

Ethernet (IEEE 802.3) is a standard that defines wired connections of networked devices. This standard defines the way data is formatted over the wire to ensure disparate devices can communicate over the same cables.

Device Address

Media Access Control (MAC) Address

Every network device is assigned a Media Access Control (MAC) address.

An example is 00-13-02-1F-58-F5.

Internet Protocol (IP) Address

While MAC addresses are generally assigned in the firmware of the interface, IP hosts associate that address with a unique logical address.

This logical IP address represents the network interface within the network and can be useful to maintain communications when a physical device is swapped with new hardware.

Examples are 192.168.1.1 and 2001:db8::ffff:0:1

Network diagram

Networking Models

The purpose of all communications is to exchange information and ideas between people and organizations so that they can get work done:

  • Provide reliable, managed communications between hosts (and users)

  • Isolate functions in layers

  • Use packets as the basis of communication

  • Standardize routing, addressing and control

  • Allow layers beyond internetworking to add functionality

  • Be vendor-agnostic, scalable and resilient

Application

Upper Level

Application

Presentation

Upper Level

Application

Session

Upper Level

Application

Transport

Lower Level

Data Transport

Network

Lower Level

Data Transport

Data Link

Lower Level

Data Transport

Physical

Lower Level

Data Transport

The upper layer, also known as the host or application layer, is responsible for

  • managing the integrity of a connection

  • controlling the session

  • establishing communication sessions between two computers.

  • maintaining communication sessions between two computers.

  • terminating communication sessions between two computers.

  • transforming data received from the Application Layer into a format that any system can understand

  • allows applications to communicate

  • determines whether a remote communication partner is available and accessible

The lower layer is often referred to as the media or transport layer and is responsible for

  • receiving bits from the physical connection medium

  • converting bits from the physical connection medium into a frame

  • Frames are grouped into standardized sizes

  • Route data, a destination address, is added to the frames of data to create packets

  • Once we have this sorted, the host layer takes over

Open Systems Interconnection (OSI) Model

  1. Communication structure for interconnected computer systems

  2. Each layer communicates directly with the layer above and the layer below it

  3. The Application, Presentation, and Session Layers (5-7) are commonly referred to simply as data.

  4. each layer has the potential to perform encapsulation

    1. encapsulation occurs as the data moves down the OSI model from Application to Physical

    2. The addition of header and possibly a footer data by a protocol used at that layer of the OSI model

    3. data is encapsulated at each descending layer

    4. the previous layer’s header, payload and footer are all treated as the next layer’s payload

    5. The data unit size increases as we move down the conceptual model and the contents continue to encapsulate.

  5. each layer has the potential to perform de-encapsulation [ decapsulation ]

    1. occurs as data moves up the OSI model layers from Physical to Application

    2. As we move up the OSI model, the data unit becomes smaller.

  6. At the Physical Layer (1)

    1. the data unit is converted into binary 01010111

    2. sent across physical wires such as an ethernet cable

  • When someone references an image file like a JPEG or PNG, we are talking about the Presentation Layer (6).

  • When discussing logical ports such as NetBIOS, we are discussing the Session Layer (5).

  • When discussing TCP/UDP, we are discussing the Transport Layer (4).

  • When discussing routers sending packets, we are discussing the Network Layer (3).

  • When discussing switches, bridges or WAPs sending frames, we are discussing the Data Link Layer (2).

Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP/IP protocol stack comprising dozens of individual protocols was developed in the early 1970s.

Layer
TCP/IP Protocol Architecture Layers

Application Layer

Defines the protocols for the transport layer.

Transport Layer

Permits data to move among devices.

Internet Layer

Creates/inserts packets.

Network Interface Layer

How data moves through the network.

TCP is a full-duplex connection-oriented protocol

UDP is a simplex connectionless protocol

Internet Control Message Protocol (ICMP) is used to determine the health of a network or a specific link

Use ping to determine whether the remote system is online

IPv4 provides a 32-bit address space

IPv6 provides a 128-bit address space

  • 216.12.146.140

  • Each octet may have a value between 0 and 255.

  • 0 is the network itself (not a device on that network)

  • 255 is generally reserved for broadcast purposes

  • Each address is subdivided into two parts:

    • the network number

    • the host

  • The network number assigned by an external organization, such as the Internet Corporation for Assigned Names and Numbers (ICANN), represents the organization’s network.

  • The host represents the network interface within the network.

Networks are typically divided into subnets

Subnet mask is used to define the part of the address used for the subnet

Mask is usually converted to decimal notation 255.255.255.0

Private addresses available for anyone to use

10.0.0.0 to 10.255.255.254

172.16.0.0 to 172.31.255.254

192.168.0.0 to 192.168.255.254

An IPv6 address is shown as 8 groups of four digits

IPv6 addresses use the hexadecimal range (0000-ffff) and are separated by colons (:) rather than periods (.)

  • can be shortened by

    • removing the leading zeros at the beginning of each field

    • substituting two colons (::) for the longest consecutive zero fields

    • All fields must retain at least one digit

2001:0db8:0000:0000:0000:ffff:0000:0001 after shortening becomes 2001:0db8::ffff:0:1

Addresses and ranges that are reserved for special uses:

  1. ::1 is the local loopback address

  2. 127.0.0.1 the local loopback address in IPv4

  3. range 2001:db8:: to 2001:db8:ffff:ffff:ffff:ffff:ffff:ffff is reserved for documentation use

  4. fc00:: to fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff are

    1. addresses reserved for internal network use

    2. are not routable on the internet

Improperly implemented TCP/IP stacks in various operating systems are vulnerable to various:

  1. DoS/DDoS attacks

  2. fragment attacks

  3. oversized packet attacks

  4. spoofing attacks

  5. man-in-the-middle

  6. monitoring / sniffing

physical ports are that you connect wires

  1. fiber optic cables

  2. Cat5 cables

to:

  1. routers

  2. switches

  3. servers

  4. computer

logical ports (sockets) that determine where the data/traffic goes

  • Communication connection is established between two systems, it is done using ports.

  • Ports allow a single IP address to be able to support multiple simultaneous communications, each using a different port number.

  • Data types are mapped using port numbers associated with services.

  • Well-known ports (0–1023)

    • related to the common protocols

  • Registered ports (1024–49151)

    • proprietary applications from vendors and developers.

  • Dynamic or private ports (49152–65535)

Port
Vuln
Protocol
Secure Port
Protocol

21

plaintext

File Transfer Protocol

22* - SFTP

Secure File Transfer Protocol

23

plaintext

Telnet

22* - SSH

Secure Shell

25

unencrypted

Simple Mail Transfer

587 - SMTP

SMTP with TLS

37

legacy

Time Protocol

123

Network Time Protocol

53

modified

Domain Name Serv.

853 - DoT

DNS over TLS

80

unencrypted

HTTP

443

HyperText Transfer Protocol (SSL/TLS)

143

unencrypted

IMAP

993

IMAP for SSL/TLS

161

unencrypted

SNMP

161

SNMPv3

162

unencrypted

SNMP

162

SNMPv3

389

unencrypted

LDAP

636

LDAPS

445

unencrypted

SMB

2049

Network File System

  1. Between the client and the server, there is a system for synchronizing and acknowledging any request that is known as a three-way handshake.

  2. This handshake is used to establish a TCP connection between two devices.

  3. Depending on the exact protocol, there may be additional connection negotiation taking place.

  4. First, the client sends synchronization (SYN) packet to the web server’s port 80 or 443.

  5. This is a request to establish a connection.

  6. The web server replies to the SYN packet with an acknowledgement known as a SYN/ACK.

  7. Finally, the client acknowledges the connection with an acknowledgement (ACK).

  8. At this point, the basic connection is established, and the client and host will further negotiate secure communications over that connection.

Last updated 1 year ago

The first 3 (24 bits) of the address denote the vendor or manufacturer of the physical network interface. No two devices can have the same MAC address in the same local network

An address is expressed as four octets separated by a dot

bytes
IPv4
all devices behind the firewall connect via the network switch, and the firewall lies between the network switch and the internet.
the primary difference between the home network and the business network is that the router, firewall, and network switch are often combined into one device supplied by your internet provider
SYN, SYN-ACK, ACK Handshake