Network Forensics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

What size is an IPv4 address

32 bits

2
New cards

How are IPv4 addresses written

Four decimal octets

3
New cards

Why does each IPv4 octet range from 0 to 255

Because 8 bits allow 256 values

4
New cards

What were IPv4 network classes used for

Dividing networks into default sizes

5
New cards

What is subnetting used for

Splitting a large network into smaller ones

6
New cards

What does CIDR replace

Replaces the old class system.

7
New cards

What does CIDR stand for?

Classless Inter-Domain Routing

8
New cards

What does the /24 in 192.168.1.0/24 mean

Network uses a 24 bit prefix to show network size in CIDR

9
New cards

How big is an IPv6 address

128 bits

10
New cards

Why was IPv6 created

IPv4 ran out of addresses

11
New cards

What number system does IPv6 use

Hexadecimal

12
New cards

What security feature is built into IPv6

IPsec support

13
New cards

List the OSI model layers in order

  1. Application Layer

  1. Presentation Layer

  1. Session Layer

  1. Transport Layer

  1. Network Layer

  1. Data Link Layer

  1. Physical Layer

14
New cards

What does OSI stand for?

Open Systems Interconnection

15
New cards

What is the OSI model used for?

A 7-layer model used to understand how data moves through a network.

16
New cards

What is the job of the application layer?

Where network applications live (e.g., web browsers, email clients).

17
New cards

What protocols are at the Application layer

  • HTTP

  • FTP

  • Telnet

  • NTP

  • DHCP

18
New cards

What is the job of the Presentation layer

Data translation (into a format applications can understand) and encryption

19
New cards

What does the Session layer manage

  • Connections between devices

  • Manages sessions (connections) between devices.

  • Keeps track of who is connected to who.

20
New cards

What does the Transport layer do

End to end communication (uses TCP or UDP)

21
New cards

Where do ports live in the OSI model

Transport layer

22
New cards

What is the role of the Network layer

Routing data packets between different networks
(Routing data between networks and IP addressing)

23
New cards

What does the Data Link layer handle

MAC addresses and frames (Ex. Ethernet)

24
New cards

What does the Physical layer send

Electrical or optical signals

25
New cards

List the layers of the TCP/IP Model in order

  1. Application Layer (OSI Layers 5-7)

  1. Transport Layer (OSI Layer 4)

  1. Internet/Network Later (OSI Layer 3)

  1. Network Interface Layer (OSI Layer 1-2)

26
New cards

What does the TCP IP Application layer combine

OSI layers 5 6 and 7

27
New cards

What protocols run in the TCP IP Internet layer

IP ARP ICMP IGMP

28
New cards

What does the Network Interface layer contain

MAC addressing and framing

29
New cards

What type of connection is TCP

Reliable connection based

30
New cards

Why is TCP slower than UDP

It ensures every packet arrives

31
New cards

What is TCP used for

Web browsing, email, file transfer

32
New cards

What type of connection is UDP

Fast and connectionless

33
New cards

What is UDP used for

Gaming streaming voice calls

34
New cards

What does an HTTP GET do

Fetches a web page/resource (read-only).

35
New cards

What does an HTTP POST do

Fetches only the headers (metadata) of a page, not the content.

36
New cards

What does HTTP PUT do

Creates or replaces a resource on the server.

37
New cards

What does HTTP POST do

Adds new data or submits information (often used in forms).

38
New cards

What does HTTP DELETE do

Removes a resource from the server

39
New cards

What is encapsulation

Wrapping one packet inside another packet so it can travel across a network.

40
New cards

Why do network layers encapsulate data

To add routing and control information

41
New cards

What layer does Ethernet operate on

Data Link layer

42
New cards

What fields are needed to send a frame over Ethernet?

  • Source MAC address → identifies the device sending the frame

  • Destination MAC address → identifies the device receiving the frame

  • Type → tells what kind of data is inside (like IP, ARP, etc.)

  • Payload → the actual data being sent

  • Checksum (FCS) → used to detect errors in the frame

43
New cards

What does the FCS field do

Checks for errors

44
New cards

What are the key fields of an IP header?

  • Version → tells which IP version (IPv4 or IPv6)

  • Source IP address → device sending the packet

  • Destination IP address → device receiving the packet

  • Checksum → error checking for the header

45
New cards

What layer is the IP header used in?

Network Layer

46
New cards

What are the key fields of a UDP header?

  • Source port → sending application’s port

  • Destination port → receiving application’s port

  • Length → size of UDP header + payload

  • Checksum → error checking for UDP packet

47
New cards

What layer is the UDP header used in?

Transport Layer

48
New cards

What are the key fields of a TCP header?

  • Source port → sending application’s port

  • Destination port → receiving application’s port

  • Sequence number → order of data being sent

  • Acknowledgment number → confirms received data

  • Flags → control bits for connection (e.g., SYN, ACK, RST)

  • Length → size of TCP header + payload

  • Checksum → error checking for TCP segment

49
New cards

What layer is the TCP header used in?

Transport Layer

50
New cards

What does the IP header version field indicate

IPv4 or IPv6

51
New cards

What does the UDP length field contain

Header plus payload size

52
New cards

Why does TCP use sequence numbers

To order data

53
New cards

What is port 20, 21 used for?

File Transfer Protocol (sending & receiving files)

54
New cards

What is port 22 used for

SSH

Secure Shell (secure remote login)

55
New cards

What is port 23 used for

Telnet

Remote login (not secure)

56
New cards

What is port 25 used for

SMTP (Simple Mail Transfer Protocol for sending emails)

57
New cards

What is port 53 used for

Domain Name System (translates website names to IP addresses)

58
New cards

What is port 80 used for

HTTP

Accessing websites (web browsing)

59
New cards

Why is port 407 risky

  • Used for remote access to computers

  • Not commonly used for legitimate purposes

Risk: Can be exploited by hackers to gain unauthorized access

60
New cards

What starts a TCP connection

  1. Initiator (client) sends a packet with SYN flag set to request a connection.

  2. Receiver (server) responds with SYN + ACK to acknowledge and agree to the connection.

  3. Initiator sends a final ACK, completing the handshake. ( Connection is now established.)

61
New cards

How is a TCP connection closed

  1. Initiator sends a packet with FIN flag set to indicate it wants to close the connection.

  2. Receiver sends an ACK to acknowledge the FIN packet (must have a valid sequence number).

  3. Receiver may also send its own FIN if it’s ready to close the other side.

  4. Initiator sends a final ACK, fully terminating the TCP session.

62
New cards

What does a network sniffer do

Captures and logs packets (network traffic)

63
New cards

What is Wireshark used for

Packet sniffer and network protocol analysis

64
New cards

What does Nmap scan

  • Scans ports on a target device

  • Shows which ports are open, closed, or filtered

  • Helps identify which services are running on open ports

65
New cards

What is Snort

Intrusion detection system

  • Can detect threats and suspicious activity (log, analyze, alert)

66
New cards

What are the three main packet sections

  • Header

  • payload

  • trailer/footer

67
New cards

What does the header contain in the packet

metadata about the packet (protocol info, source/destination, etc.)

68
New cards

What does the payload contain in the packet

the actual data being sent

69
New cards

What does the trailer/footer contain in the packet

Provides data error checking to ensure correct transmission

70
New cards

What is the goal of a DoS attack

Overwhelm a system so real users can’t access it.

71
New cards

What is a Ping of Death

  • Sends an oversized ICMP (PING) packet larger than the system can handle.

  • Causes crashes or freezes.

72
New cards

What is a Ping Flood

Sends huge amounts of ICMP echo requests (PINGs).

73
New cards

What is a Teardrop attack

Send broken IP fragments, causing the system to crash while trying to fix them

74
New cards

What is a SYN flood

Abusing handshake by not sending ACK

  • Attacker sends many SYN packets but never sends the final ACK.

  • Server waits forever, keeping resources busy—eventually it can’t accept real users.

75
New cards

What is a Land Attack

  • Sends a fake TCP SYN where source IP = destination IP and same ports.

  • Target thinks it's talking to itself and becomes confused or crashes.

76
New cards

What is a Smurf attack

ICMP amplification using broadcast

  • Uses ICMP echo requests to a broadcast address (many hosts).

  • Each host replies → creates an amplified traffic jam toward the victim.

77
New cards

What is a Fraggle Attack

Same idea as Smurf attack, but with UDP packets instead of ICMP. It uses UDP echo requests sent to a broadcast address, amplifying the traffic directed at the target.

78
New cards

What is DHCP starvation

Consuming all DHCP IP addresses by flooding the DHCP server with requests for IP addresses, preventing legitimate users from obtaining an IP address.

79
New cards

What is a HTTP POST attack

  • Sends a legitimate HTTP POST request, but…

  • Sends the message body extremely slowly.

  • Server keeps waiting, holding connections open → becomes overloaded.

80
New cards

What is a PDoS

Damages system firmware or hardware → system becomes unusable.

aka phlashing

81
New cards

What is Packet Mistreating

router breaking packets

  • Happens when a compromised router mishandles packets.

  • Causes network congestion or routing failures.

  • Slows down or blocks legitimate traffic → DoS effect.

82
New cards

What is a login DoS

  • Floods the login system with repeated login attempts.

  • Can:

    • Lock out accounts (from too many failed attempts)

    • Prevent real users from logging in at all

83
New cards

What does a hub do with packets

Sends every packet to all ports (no intelligence)

  • Can cause traffic flooding)

84
New cards

What does a Network Card (NIC) do

  • Allows a computer to connect to a network.

  • Used in Ethernet LANs.

  • Sends any packet it receives out every port (basic, no filtering).

85
New cards

What does a switch do

Sends packets to the correct MAC

86
New cards

What does a router do

  • Connects different networks together (e.g., home network internet).

  • Makes decisions using IP addresses.

  • Sends traffic only to the destination network.

  • Separates broadcast domains.

87
New cards

What is router table poisoning

  • Attackers send fake routing information to the router.

  • This creates incorrect entries in the routing table.

  • Can cause:

    • Artificial congestion

    • Router overload

    • Traffic being redirected to the attacker

    • Loss of network connectivity

88
New cards

Why must investigators not turn off a router

Volatile logs may be lost

89
New cards

What does show running-config display

Current router settings

90
New cards

What does a packet filter firewall check

Source IP destination IP ports protocol

91
New cards

What advantage does a stateful firewall have

Tracks connection history

92
New cards

What does 802.11x represent

Wi Fi standards

93
New cards

Why is WEP insecure

Weak RC4 encryption easily cracked

94
New cards

What does WPA use for encryption

TKIP per packet keys

95
New cards

Why is WPA3 safer

Requires live interaction for password guesses