Lecture Notes on Ethical Hacking and Networking

Jul 30, 2024

Lecture Notes on Ethical Hacking and Networking

Introduction to Ethical Hacking

  • Instructor: आशीष कुमार
  • Course: Complete Ethical Hacking Beginners to Advanced
  • Importance of understanding ethical hacking through legal activities.

Definition of Ethical Hacking

  • Hacking: Compromising systems, stealing data.
  • Ethical Hacking: Involves legal activities defined by rules and regulations.
  • Legal Considerations: Must obtain written permission from system owners for testing.

Growing Demand for Cyber Security

  • Continuous growth in demand for ethical hacking skills.
  • Increasing rates of cyber crime impacting families, governments, and corporates.

Role of Networking in Ethical Hacking

  • Essential for ethical hackers to understand how systems communicate and transfer data.
  • Importance of identifying vulnerabilities in communication channels.

Key Networking Concepts

  1. Computer Networking: Communication mechanism between systems.

    • Sharing software, files, information.
    • Importance of information preservation and security.
  2. Types of Networks:

    • LAN (Local Area Network): Connects 5-10 systems.
    • MAN (Metropolitan Area Network): Connects multiple systems across a city.
    • WAN (Wide Area Network): Connects systems across long distances (e.g. the Internet).
  3. Networking Entities:

    • IP Address: Primary identifier for systems on a network.
    • MAC Address: Unique identifier for hardware devices in a network.

Types of IP Addresses

  • IPv4 and IPv6: Different versions of IP addresses to suggest unique identifiers; IPv4: 32-bit, limit 4.7 billion addresses; IPv6: 128-bit, virtually limitless addresses.
  • Static vs Dynamic: Static IPs don’t change, while dynamic IPs can change with each session.

Below Key Networking Tools & Protocols

  • Examples of protocols include TCP, UDP, and the respective ports used for communication.

Introduction to Protocols

  • Definition: Protocols define the rules for data transmission and reception.

TCP vs UDP

  • TCP: Reliable, establishes a connection.
  • UDP: Unreliable, does not establish a connection, data is sent without guaranteed delivery.

Domain Names and DNS

  • Domain Name System (DNS): Translates domain names into IP addresses allowing us to access websites.
  • Types of DNS Records: A record, CNAME, MX record, etc.

Layers of Internet

  1. Surface Web: Accessible through standard search engines.
  2. Deep Web: Non-indexed content not accessible via standard searches.
  3. Dark Web: Section of the deep web where illegal activities may take place.

Understanding VPN and Proxy Services

  • VPN: Provides anonymity by allowing users to connect to the internet through a remote server.
  • Issues with VPN: Long-term static IP, risk of leaking DNS, etc.
  • Proxy: Acts as an intermediary, circumventing firewall and security layers.

Mac Address Modification

  • Understanding how Mac addresses can be modified, including methods for doing so manually and automatically.

Conclusion

  • Summarized the core concepts of ethical hacking, networking, and importance of anonymity through the internet.

Action Items:

  • Review each key networking concept.
  • Familiarize yourself with the definitions and examples provided.