Networking Fundamentals

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

Ethical Hacking CIS4560

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

pwd

displays the absolute path of the current working directory

2
New cards

ls -la

list all files in long format

3
New cards

Why do Networks mater in Security

  1. Networks are Primary attack Vectors

  2. Data travels across untrusted networks

  3. Protocols have inherent vulnerabilities

  4. Network traffic can be intercepted

4
New cards

Port 80

HTTP | Hyper Text Transfer Protocol; Allows web browsers to send requests to servers and recieve responses

5
New cards

Port 20

FTP data transfer active mode

6
New cards

Port 21

FTP control connectionS

7
New cards

Port 22

SSH | protocol used to establish an encrypted secure connection between two computers

8
New cards

TCP

Transmission Control Protocol; a connection-oriented reliable data transfer

9
New cards

UDP

User Datagram Protocol: fast, connectionless protocol(unreliable)

10
New cards

Security Implications of TCP/IP stack

1. Each layer has potential vulnerbilities
2. Attackers can target any layer
3. Data can be intercepted between layers
4. Protocol weaknesses can be exploited

11
New cards

Port 443

HTTPS(or DNS over HTTPS) | HTTP over SSL(Secure Sockets Layer) and TLS (Transport Layer Security)

12
New cards

Port 53

DNS | Domain Name System - name resolution: translating human-friendly domain names (like nytimes.com) into machine-readable IP addresses

13
New cards

Port 23

Telnet | old network protocol used for remote login and command-line communication with other computers or devices over a network

14
New cards

Port 22

SSH (or SFTP)| Secure Shell, a cryptographic network protocol that enables secure remote access to computers and servers over an unsecured network. Provides a secure channel for communication by encrypting the data exchanged between the client (your local machine) and the server (the remote machine)

15
New cards

Port 3389

RDP | Remote Desktop Protocol

16
New cards

Port 5900

VNC| Virtual Network Computing. 

17
New cards

Port 25

SMTP| Simple Mail Transfer Protocol. Unencrypted and can be weak to email spoofing.

18
New cards

Port 110

POP3| Post Office Protocol v3