---
title: '01 Network Protocols'
disqus: hackmd
---
01 Network Protocols
===
<style>
img{
/* border: 2px solid red; */
margin-left: auto;
margin-right: auto;
width: 80%;
display: block;
}
</style>
## Table of Contents
[TOC]
Tools
---
### Kali Linux
- linux distro with many useful security software
- Eg. wireshark, nmap etc.
- can run off LiveCD or USB
- rebuild of backtrack linux
### Wireshark
- open source packet analyser
- network traffic captured & stored for offline analysis
- displays info in packets in human-readable format

- with wireshark you can
- understand how protocols work
- reassemble captured network traffic
### Nmap
- test if port opened, SYN packet sent to port
- if SYN/ACK packet returned, port opened
- nmap is popular tool to scan for opened ports

HTTP
---
- when client requests webpage, request sent as HTTP GET method

- when client submits data in webform, data sent as HTTP POST method

### HTTP Methods
- GET
- request data from web server
- most commonly used
- POST
- send data to web server from webform
- HEAD
- similar to GET but returned packet only has HTTP headers with no response body
- used for testing
- PUT
- replace resource specified in URL
- usually not activated
- not secure
- DELETE
- delete res specified in URL
- TRACE
- perform loopback test to res specified in URL
- OPTIONS
- describe comm options available
- not so good devs will usually leave this activated
- always use this method to find info about web server
- Eg. using apache or IIS
### HTTP & HTTPS
- HTTP
- port 80
- data not encrypted
- HTTPS
- encrypt HTTP data
- port 443
Protocols for Remote Access
---
- diff protocols for remote access
- FTP
- telnet
- SSH, SCP, SFTP
- remote desktop
### Netstat
- is command avail on windows & linux to display opened ports & current conns
### Remote Desktops
- allows comp's desktop env to be viewed/controlled remotely
- used by IT support to troubleshoot comp probs
- can be used by hackers impersonating IT support staff & getting users to allow remote desktop access
- __Remote Access Trojan (RAT)__
- malware that allows hacker to control comp remotely
#### Remote Desktop Software
- remote desktop services (microsoft)
- teamviewer
- tightVNC
- based on virtual network computing
- more
#### Remote Desktop Services
- microsoft's remote desktop conn
- allows users to connect remotely to windows
- tcp port 3389
- if remote desktop needed, use network lvl auth for more security

### File Transfer Protocol (FTP)
- protocol for copying files between systems
- FTP server runs on
- port 21 for control conns
- port 20 or other for data conn
- no encryption
- all data in plaintext
- can use alts like SFTP
### Telnet
- allows user to login remotely to another system
- port 23
- old protocol - data not encrypted
- shld use alts like Secure Shell (SSH)
### Secure Shell (SSH)
- popular app for remote login
- port 22
- data encrypted across network
- SCP (Secure Copy) & SFTP (Secure FTP) work over SSH protocol to allow secured file transfers
Network Protocols
---
### Address Resolution Protocol (ARP)
- for device to send packet to another on same local network need MAC of dest
- ARP used to find MAC
- to find MAC of IP
- 

#### ARP Poisoning/Spoofing
- if atker can poison ARP table, can cause devices to send packets to him instead
- normal scenario
- 
- attack scenario
- 
### Domain Name System (DNS)
- when browsing internet, user enters domain name
- DNS resolves domain names to their IP addr
- DNS server/nameserver contains db that holds section of domain names mapped to IP addr

#### DNS Poisoning/Spoofing
- if atker can edit DNS db or DNS cache, he can direct users to own website instead

- proper config of DNS can reduce risks of such atks
### Simple Network Management Protocol (SNMP)
- for remote monitoring & management of network nodes
- SNMP manager monitors set of SNMP agents installed on network nodes
- checks perf of monitored nodes
- makes changes in config of monitored nodes
- SNMP agent can send warning to SNMP manager of unusual situations
### Ping Sweeps
- ping sweep sends ping packets to range of IP to see which system will reply
- used to see which system is alive
- AKA ICMP sweep
### Banner Grabbing
- many services return info like ver num when client connects to it
- a "banner"
- banner grabbing - method hackers use to find info abt running service
- usually telnet/netcat (nc) used to do banner grabbing

Summary
---


###### tags: `EHD` `DISM` `School` `Notes`