Network Basics for Hackers

Course Overview

In this 3-day course, OTW addresses the basics of networking and how they are manipulated by hackers. Based upon Occupytheweb’s new book. You will learn about network infrastructure, common protocols, and potential vulnerabilities, gaining both theoretical knowledge and practical skills using various networking tools.

Course Outline

  1. Key terminology in networking

    • Network topologies (bus, star, ring, mesh)

    • Cable types and structures (twisted pair, coaxial, fiber optic)

    • OSI and TCP/IP models

  1. Network Infrastructure and Analysis Tools

    • Wireshark: Packet capture and analysis

    • Nmap: Network discovery and security auditing

    • Other essential networking tools (tcpdump, netstat)

  2. Network Protocols Overview

    • Protocol layers and encapsulation

    • Common application layer protocols (HTTP, FTP, SSH)

    • Transport layer protocols (TCP, UDP)

    • Network layer protocols (IP, ICMP)

  3. TCP/IP In-Depth

    • TCP/IP structure and operation

    • TCP handshake and connection management

    • IP packet structure

    • Practical tools and commands for TCP/IP analysis

  4. IP Addressing

    • IPv4 vs IPv6

    • Public vs Private IP addresses

    • Subnetting and CIDR notation

  5. Routing

    • Routing concepts and algorithms

    • Configuring and troubleshooting routes

  6. DHCP (Dynamic Host Configuration Protocol)

    • DHCP operation and message types

    • DHCP vulnerabilities and security considerations

    • Troubleshooting DHCP issues

  7. DNS (Domain Name System)

    • DNS hierarchy and record types

    • Local host file and its uses

  8. SNMP (Simple Network Management Protocol)

    • SNMP architecture and components

    • SNMP versions and security considerations

  9. ARP (Address Resolution Protocol)

    • ARP operation and packet structure

    • ARP vulnerabilities (ARP spoofing, ARP cache poisoning)

  10. SMB (Server Message Block)

    • SMB protocol overview and versions

    • EternalBlue vulnerability and its impact

  11. Bluetooth

    • Bluetooth technology and standards

    • Common Bluetooth attacks and vulnerabilities

  12. Wi-Fi

    • Wi-Fi standards and frequencies

    • Wi-Fi authentication and encryption methods

    • Wi-Fi vulnerabilities and attacks

  13. SMTP (Simple Mail Transfer Protocol)

    • SMTP operation and commands

    • Email delivery process

By the end of this course, you will be able to:

  • Understand fundamental networking concepts and terminologies

  • Analyze network traffic using professional tools

  • Configure and troubleshoot common network services

  • Identify potential vulnerabilities in various network protocols

And More!