Lesson 10 - Transport Layer

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Transmission Control Protocol (TCP)

Guarantees delivery of all packets in an ordered fashion

-Reliable

-Sends out an ACK to indicate successful receipt of packet

2
New cards

User Datagram Protocol (UDP)

Delivers packets as fast as possible but w/ no delivery guarantee

-Unreliable

-Faster than TCP

3
New cards

Ports

Identifies where data is directed

-16bit

-range from 1-65,535

4
New cards

HTTP

80

5
New cards

HTTPS

443

6
New cards

FTP

21

7
New cards

SSH

22

8
New cards

Netstat

Displays active TCP connections, ports on which the computer is listening

9
New cards

Netstat - a

Displays all active TCP connections and the TCP and UDP ports in which the computer is listening

10
New cards

Netstat -n

Displays all active TCP connections, addresses and port numbers are expressed numerically and no attempt is made to determine names

11
New cards

Netstat -o

Displays all active TCP connections and includes the process ID’s (PID) for each connection

12
New cards

Netstat -s

Displays statistics by protocol, default statistic displayed are TCP, UDP, ICMP and IP

13
New cards

Sliding Window Protocol

Used with each packet so that the receiver informs the sender if the size of the receive window which is the number of bytes of data it is willing to accept before the sender has to pause and wait for the response

14
New cards

TCP connection

TCP Syn → Receiver

Receiver sends SYN-ACK

Sender receives SYN-ACK

Sender sends ACK

Receiver gets ACK

TCP connection established

15
New cards

SYN flood attack1

Instead of sending ACK message after sender receives SYN-ACK, handshake is left unfinished and in an open and occupied status, allowing for the attacker to saturate all open ports so that users cannot connect

16
New cards

Network Address Translation

Translates addresses in an internal network to an external address that is used for communication to and from the outside world

-implemented by placing a router in-between the internal and private network and public network

17
New cards

10.0.0.0-10.255.255.255

24 bits

18
New cards

172.16.0.0 - 172.31.0.0

20 bits

19
New cards

192.168.0.0 - 192.168.255.255

16 bits

20
New cards

TCP Session Hijacking

Hacker alters a TCP connection from another user

21
New cards

TCP Sequence

Creates a spoofed session, attempts to guess original sequence number sent by server at start

22
New cards

Blind Injection

Done without anticipating being able to see the servers response, allows for only one way communication

23
New cards

ACK Storms

Back and forth communication between client and server to attempt to resync communicationC

24
New cards

Complete Session Hijacking

Attacker needs to be on the same network, this is done through packet sniffing to see sequence then the hacker injects a packet to server using a spoofed IP.