Networking Concepts

From HackOps
Revision as of 02:32, 29 May 2025 by Vegard (talk | contribs)
Jump to navigation Jump to search

Networking Concepts

Understanding network fundamentals is essential for reconnaissance, lateral movement, and post-exploitation. Knowing how IP addressing, protocols, routing, and ports function allows attackers to discover services, manipulate traffic, tunnel covertly, and evade detection.

This section provides a structured overview of the core principles and tools used to analyze, interact with, and exploit networks in real-world offensive operations.

1. Network Fundamentals

2. Protocol Behavior

3. Transport & Application Protocols

4. Port Overview

Understanding ports and services is critical for network reconnaissance and service identification.

Port Protocol Common Service Description
20, 21 TCP FTP File Transfer Protocol – used for transferring files
22 TCP SSH Secure Shell – remote access to systems
23 TCP Telnet Unencrypted remote login service
25 TCP SMTP Simple Mail Transfer Protocol – sending emails
53 UDP/TCP DNS Domain Name System – resolves domain names to IP addresses
67, 68 UDP DHCP Assigns IP addresses automatically
80 TCP HTTP Standard web traffic
110 TCP POP3 Email retrieval
123 UDP NTP Clock synchronization
143 TCP IMAP Internet Message Access Protocol – email
161, 162 UDP SNMP Device monitoring
443 TCP HTTPS Encrypted HTTP via TLS
445 TCP SMB Windows file/printer sharing
3306 TCP MySQL MySQL database service
3389 TCP RDP Windows remote access
8080 TCP HTTP-Alt Proxy or alternate web services

5. IPv6 Considerations

6. Diagnostic & Monitoring Tools

7. Packet Crafting & Manipulation

8. Tunneling & Encapsulation

9. Network Security Devices & Controls

10. Packet Capture & Analysis

  • tcpdump, Wireshark, pcap files
  • Common filters: `tcp.port == 80`, `ip.addr == 192.168.1.1`, `dns.qry.name`

11. Network Mapping & Visualization

12. Protocol References