What is the TCP/IP model
The TCP/IP model, also known as the Internet Protocol Suite, is a more practical framework developed by the U.S. Department of Defense. It is designed to ensure successful communication over the internet and consists of four layers.
What are the OSI model layers
What is the OSI models
The OSI (Open Systems Interconnection) model is a conceptual framework created by the International Organization for Standardization (ISO) to standardize the functions of a telecommunication or computing system into seven distinct layers. Each layer serves specific functions and communicates with the layers directly above and below it.
What is the relation between the OSI model and the TCP/IP model
What are the TCP/IP layers
What are the main protocols for each layer in the OSI model?
OSI Model
• Physical Layer: Ethernet, DSL, ISDN, USB, Bluetooth, Wi-Fi
• Data Link Layer: Ethernet, PPP, HDLC, Frame Relay, ATM, ARP
• Network Layer: IP, ICMP, IGMP, IPsec
• Transport Layer: TCP, UDP, SCTP, DCCP
• Session Layer: NetBIOS, PPTP, RPC
• Presentation Layer: SSL/TLS, JPEG, GIF, MPEG, ASCII, EBCDIC
• Application Layer: HTTP, FTP, SMTP, DNS, SNMP, Telnet, SSH, IMAP, POP3, NTP
What is packaging capsulation and what it is used for?
Packet encapsulation is the process of enclosing data with protocol-specific information at each layer of the TCP/IP model. This method ensures that data can be transmitted across networks and interpreted correctly by the receiving device.
How does the pack encapsulation works?
What are the addresses used for each layer in the TCP/IP model?
Each layer has its own addressing structure
○ Data link layer: MAC address (for Ethernet)
■ A globally unique address “burnt” in the NIC
■ The ARP protocol maps an IP address to a MAC
addr
○ Internet layer: IP address
■ Identifies “globally” a network host
■ There can be private addresses (RFC1918 for
IPv4)
○ Transport layer: port
■ Identifies a specific service on a host
What are the main characteristics of UDP protocol?
What are the main characteristics of the TCP protocol?
What are the typical network protocol attacks?
Denial of service (against availability)
Sniffing (against confidentiality)
Spoofing (against integrity and authenticity)
What are some examples of network protocol attacks that promotes denial of service
Killer packets
SYN flood
Smurf, multiplication or amplification attacks
Distributed DoS
To witch taxonomy killer packets belong to and what are some examples of this type of attack
It belongs to the denial of service taxonomy
The examples are ping of death, teardrop, land attack
To each type of denial of service attack, the ping of death belongs to and how does it works?
The “Ping of Death” attack is a type of cyber attack that exploits vulnerabilities in the way some computer systems handle ICMP (Internet Control Message Protocol) packets, particularly ICMP Echo Request packets (commonly known as “ping” packets).
To what type of denial of service attack the teardrop attack belongs to and how does it works?
The “Teardrop” attack is a type of cyber attack that exploits vulnerabilities in the way some computer systems handle fragmented IP packets. Here’s a simple explanation of how the Teardrop attack works:
To what type of denial of service attack the land attack belongs to and how does it works?
Killer packets attack
The “Land” attack is a type of cyber attack that exploits vulnerabilities in the TCP/IP protocol stack to disrupt network communication. Here’s a simple explanation of how the Land attack works:
To what taxonomy the SYN flood attack belongs to and how does it works?
It belongs to the denial of service taxonomy
Or generates a high volume of SYN request with spoofed source addresses. This way many half open TCP/IPP connections fill the queue.
The filled queue results in the dropping off legitimate clients request
How do we mitigate SYN flood attacks?
With SYN-cookies
What type of taxonomy distributed DoS attack belongs to how does it works?
He belongs to the denial of service taxonomy
A Distributed Denial of Service (DDoS) attack works by overwhelming a target system or network with a flood of traffic from multiple sources, making it inaccessible to legitimate users. Here’s how a DDoS attack typically works:
What is the DDoS Smurf attack?
The DDoS Smurf attack is a type of distributed denial-of-service (DDoS) attack that exploits the Internet Control Message Protocol (ICMP) and IP broadcast addresses to amplify the volume of attack traffic directed at a victim. Here’s how a DDoS Smurf attack works:
What is Network-level sniffing and how does it works
Network-level sniffing, also known as packet sniffing or packet capture, is the process of capturing and analyzing network traffic at the network layer (Layer 3) of the OSI model. Here’s an explanation of how network-level sniffing works:
What is ARP and how does it works?
ARP stands for Address Resolution Protocol. It is a communication protocol used in computer networks to map IP addresses to MAC (Media Access Control) addresses. Here’s how ARP works:
What is ARP spoofing?
ARP spoofing, also known as ARP poisoning or ARP cache poisoning, is a type of cyber attack where an attacker sends falsified Address Resolution Protocol (ARP) messages over a local area network. Here’s how ARP spoofing works: