Table of Contents
1: What is Networking?
Answer: A network is a collection of computers, servers, network devices, and other devices connected through a medium for sharing resources and information.
2: Reasons for building networks?
Answer: Networks are built to facilitate communication, resource sharing, collaboration, and information exchange among connected devices.
3: Pros and Cons of Network?
Pros of Network | Cons of Network |
Increased efficiency. | Security concerns. |
Resource sharing. | Maintenance challenges. |
Centralized data management. | Initial setup costs. |
What is Computer Networking?
1: Communication
2: Sharing Software
3: Sharing File
4: Sharing Info
5: Information Preservation
6: Security
7: Sharing Hardware
8: Sharing Data
Types of Networks
1: LAN (Local Area Network)
2: MAN (Metropolitan Area Network)
3: WAN (Wide Area Network)
4: Types of Devices
1: Network Devices:
Devices specifically designed for network communication.
Example: Routers and Switches.
2: End User Devices:
Devices used by individuals.
Example: Computers, Tablets, and Smartphones.
Network Scanning Methodology
1: Selecting Target
2: Scan for IP range
3: Scan for Open Ports
4: Checking Services
5: Grabbing Versions
6: Grabbing OS
7: Bypassing IDS
8: Selecting the Correct Scan
What is a URL?
1: URL (Uniform Resource Locator).
2: Web Resource Unique Identifier.
3: protocol://hostname[:port]/[path/]file[?param=value]
4: http://walikhankakar.com:80/auth/login.ashx?uid=129
5: URI (Uniform Resource Identifier)
IPv6 – Neighbor Discovery Protocol
IPv6 — NDP (Neighbor Discovery Protocol):
1: No broadcast!
Operates using multicast with ICMPv6
2: Neighbor Mac Discovery:
Replace the IPv6 ARP
3: SLAAC (Stateless Address Auto-configuration):
Automatic configuration of the IP address without a DHCP server.
4: DAD (Duplication Address Detection):
No duplicate IPs!
5: Discover routers:
Router Solicitation (RS) and Router Advertisement (RA)
Basics of Networking
1: Protocol services and Port No.
2: 3-way handshake.
4: TCP headers and UDP headers.
5: Secure Socket Layer.
6: OSI Layers.
7: Network Topologies.
8: TCP/IP Protocol.
9: Subnetting.
10: Tunneling.
11: Network Services Vulnerability.