Course Overview
In this 3-day course, OTW addresses the basics of networking and how they are manipulated by hackers. Based upon Occupytheweb’s new book. You will learn about network infrastructure, common protocols, and potential vulnerabilities, gaining both theoretical knowledge and practical skills using various networking tools.
Course Outline
Key terminology in networking
Network topologies (bus, star, ring, mesh)
Cable types and structures (twisted pair, coaxial, fiber optic)
OSI and TCP/IP models
Network Infrastructure and Analysis Tools
Wireshark: Packet capture and analysis
Nmap: Network discovery and security auditing
Other essential networking tools (tcpdump, netstat)
Network Protocols Overview
Protocol layers and encapsulation
Common application layer protocols (HTTP, FTP, SSH)
Transport layer protocols (TCP, UDP)
Network layer protocols (IP, ICMP)
TCP/IP In-Depth
TCP/IP structure and operation
TCP handshake and connection management
IP packet structure
Practical tools and commands for TCP/IP analysis
IP Addressing
IPv4 vs IPv6
Public vs Private IP addresses
Subnetting and CIDR notation
Routing
Routing concepts and algorithms
Configuring and troubleshooting routes
DHCP (Dynamic Host Configuration Protocol)
DHCP operation and message types
DHCP vulnerabilities and security considerations
Troubleshooting DHCP issues
DNS (Domain Name System)
DNS hierarchy and record types
Local host file and its uses
SNMP (Simple Network Management Protocol)
SNMP architecture and components
SNMP versions and security considerations
ARP (Address Resolution Protocol)
ARP operation and packet structure
ARP vulnerabilities (ARP spoofing, ARP cache poisoning)
SMB (Server Message Block)
SMB protocol overview and versions
EternalBlue vulnerability and its impact
Bluetooth
Bluetooth technology and standards
Common Bluetooth attacks and vulnerabilities
Wi-Fi
Wi-Fi standards and frequencies
Wi-Fi authentication and encryption methods
Wi-Fi vulnerabilities and attacks
SMTP (Simple Mail Transfer Protocol)
SMTP operation and commands
Email delivery process
By the end of this course, you will be able to:
Understand fundamental networking concepts and terminologies
Analyze network traffic using professional tools
Configure and troubleshoot common network services
Identify potential vulnerabilities in various network protocols