By-
A network is defined as a group of two or more computer systems linked together. There are many types of computer networks, including the following:
Type of IP address:-
network
Host
Network address : 172.16.0.0
Broad cast address : 172.16.255.255
Private IP Address:-
1. A class:- 10.*.*.*
2. B class :- 172.16.*.* to 172.31.*.*
3. 192.168.*.*
Rest all IP address public
172.16.166.10
16.10.11.12
Time: one minute only
( Open Systems Interconnection )
:: 7 layers in OSI model :-
1. Application layer
2. Presentation layer
3. Session layer
4. Transport layer
5. Network layer
6. Data link layer
7. Physical layer
1. Physical layer:- This layer define the hardware equipment, cabling, wiring, cabling, wiring, frequencies, pulse used to represent binary signals etc. physical layer provides its services to Data-link layer.
2. Data link layer:- This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
3. Network layer :- Network layer that provides data routing paths for network communication.
4. Transport layer :- It is responsible for end-to-end communication over a network.
5. Session layer :- The session layer provides the mechanism for opening, closing and managing a session between end-user application processes.
6. Presentation layer :- Presentation layer is serves as the data translator for the network. It is sometimes called the syntax layer.
7. Application :-It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services.
IPV6
MAC
Time: one minute only
1. | FTP | 20,21 |
---|---|---|
2. | Telnet | 23 |
3. | SSH | 22 |
4. | SMTP | 25 |
---|---|---|
5. | DNS | 53 |
6. | DHCP | 67,68 |
7. | HTTP | 80 |
---|---|---|
8. | HTTPS | 443 |
9. | POP3 | 110 |
10. | IMAP | 143 |
---|---|---|
11. | SMB | 139 |
12. | SNMP | 161 |
WIRESHARK , CRYPTOGRAPHY & PHISHING
Introduction
Types :- Malware-based, DNS-based, Key-loggers, Screen-loggers etc.
Introduction
Wireshark is an open source software project, and is released under the GNU General Public License.
Wireshark is a network packet analyzer.
Its originally named Etheral.
Where we get, How installation & use ?
Introduction
• Same key is used by both parties
• Key distribution problem
• Key pairs for encryption and decryption
• Public and Private Keys
Decrypt it :- 4 6 7 11 2 9 3 2
Capture the Flag (CTF) is a special kind of information security
competitions. There are three common types of CTFs: Jeopardy, Attack-Defence and mixed.
"Our Best friend and worst enemy"
Malicious javacript can be used in different ways to
compromise user's data and privacy.
The deep web,invisible web,or hidden web are parts of
the World Wide Web whose contents are not indexed by
standard search engines for any reason. The deep web
is opposite to the surface web.
1. Total ports possible in TCP/IP
1. 65534 2. 65535 3. 65536 4. 65537 5. 65538
Time: one minute only
2. Decrypt it :-
9996668877700266777793377700444777007774444448