Skip to content

Instantly share code, notes, and snippets.

@kul1
Last active March 14, 2022 10:04
Show Gist options
  • Select an option

  • Save kul1/c459d9bebb2309f037dc49dcd0316a37 to your computer and use it in GitHub Desktop.

Select an option

Save kul1/c459d9bebb2309f037dc49dcd0316a37 to your computer and use it in GitHub Desktop.
TCP-IP&OSI Model

Compare TCP/IP & OSI Model

TCP/IP Model Protocols and Services OSI Model Devices Security
Application HTTP, FTTP, Telnet,NTP, DHCP,PING, DNS, SMTP 7.Application(HTTP,DNS,FTP), 6.Presentation(encryption), 5.Session(connection) 7.Firewall, 6.Encrypt_Decryption, 5.Connection_Authentication, Stateful(3+4+5)Firewall 6.SSL>>TLS:Encode/Encrypt, Proxy+IPS>man-in-middle. 5.RPC+Update++
Transport TCP/UDP(Port#) 4.Transport(bit) Heart of OSI, 4.Firewall-Circuit_Firewall 4.Package-Filter>Port_scanner
Network Ping: IP(Address), ARP, ICMP, IGMP 3.Network(packets) 3.Router+Switch 3.Package-Filter> ping_Flood, IPS>Spoofing
Network Interface Ethernet 2.Data Link(Frame: protocol:802.11,802.3), 1.Physical 2.Network_card_Swith_Bridge_ Repeater 1.Cable/Connector/Hub) 2.IPS>Spoofing,VLAN:Trunk-/Access+, 1.Fiber+/Cat6-

Cables for RJ45 ( 4 pairs )

Types GpsxMeter
Cat5 100Mbpsx100
Cat5e 1Gbpsx100
Cat6 10Gbpsx10
Cat6e 10Gbpsx100
Fiber Use
Multi Mode <500Mx1
Sigle Mode x50 high Freq.

Network Standard

IEEE Standards for Wired Ethernet Networks

IEEE Standards Year description
802.3i 1990 10BASE-T: 10Mbps over UTP
802.3j 1993 + Fiber Optic cable options
802.3u 1995 Fast Ethernet 100 Mbpas
802.3x 1997 Full-duplex
802.3z 1998 1000BASE-X:1 Gbps Fiber
802.3ab 1999 1000BASE-T: 1Gbps UTP
802.3ae 2000 10GBASE-X: 10Gbps Fiber
802.3af 2003 PoE 15 watts
802.3ak 2004 twinaxial cables for rack
802.3an 2006 10Gbps: UTP
802.3bs 2017 200,400Gbps over fiber-optic
802.3bt 2018 + PoE 100W

IEEE Standards for Wireless Networks

IEEE Standards Year description
802.11a 1999 54 Mbps 5 Ghz
802.11b 2000 11 Mbps 2.4 Ghz
802.11g 2003 54 Mbps 2.4 Ghz
802.11n 2007 gx4,5 Mbps MIMO
802.11ac 2013 433 Mbps/Signal, 1.3 Gbps in three-signal design
802.11ax 2019 ac, Wi-Fi 6, 6Ghz, 1-10 Gbps
  • PAN: Personal Area Network
  • LAN: router, switch
  • WLAN: wireless router
  • CAN: Campus Area Network
  • MAN:
  • WAN: No area limit :internet

Network Topology

  • Bus [==========]: Satelite Disk
  • Ring: No terminator
  • Star: switch to pcs
  • Mesh: highly available, redundancy

Virtualization:

  • Hypervisor: ESXi

Cloud Service Models:Iaas, PaaS, SaaS

Cloud Demployment Models: Private, Public, Community, Hybrid and Multi

3. Network Security

  • Social Engineering
  • Firewall not update
  • Poor physical security Measures
  • weak Password or Using default password
  • Personal Devicess Within the Networks: BOYD
  • Zero-Day: Protecting against the Unknown thread (0 day known yet)

Attacker Type

  • Vulnerability Testers : Good guy but some bad.!
  • Blue, Red, White and Purple team(continuous Improvement)
  • HACKER: WHITE HAT, Black Hat, Gray Hat
  • Insider Threats
  • Nation States
  • Scripts Kiddies

Common Threats and Attacks

  • Wiretapping: packet Sniffer
  • Port Scanning
  • Taking Control: SQL injection, Buffer (NX-Bit enable to protect)
  • Spoofing: man-in-the-middle, ARP Poisoning to Flood all traffic/every switch port(2,3)
  • Distributed Denial-of-Service(DDOS: Smurf attack(victim address send to all computers to get reply) | Cat5e | 1Gbpsx100|
  • Social Engineering: Impersonation, Phishing

Protection

  • Honeypo: then IDS the trackert
  • Proactive and Preventive Measures
  • Risk Mitigation Response: Anti-Virus for rootkits, backdoor and Trojan hourses

CIA Triad

  • Confidentiality
  • Integrity
  • Availability

Firewal

  • Packet Filters: OSI:3.Network address ?,4.Transport TCP/UDP port ? only check address/port
  • Circuit Level Gateway: Only check: Source/Destination NAT/Port (Level 4 Transport)
  • Stateful Inspection: Dynamic Rule set up to begin in H/W (3-5)
  • Application or Level 7 and under Firewall : Inspect content in Proxy Server

IDS and IPS (Intrusion Detection and Prevention)

  • ------Own Network Switch -------IPS-------Internet | V IDS

Network Commands

- Nmap
- Traceroute
- NSLookup
- Netstat
- TRACERT
- route
- arp
- ††

Network Security Operations

Level 1: Physical wiretapping or eavesdropping

Level 2: Data Link - Wireless attache Layer 1 Signal ========| Access point block (WAP) - Deauthen attack Level 2 (Decrypt Username/password with WAP) = Solution: WPA2 or WPA3 will help

- Wired Network Layer 2 eavesdrop all network traffic<=======> FIB flood |==== Good traffic===>Hager
    = Solution: IDS/IPS
- VLAN in trunk mode
    = Solution config to access mode

Level 3: Network - Ping Sweep attacek to gain information = packet-filtering firewall - Spoofing = IPS prevent attack

Level 4: Transport - port scanner = package filtering firewall

Level 5: Session - RPC = Upgrade OS, Application patch

Level 6: Presentation - man-in-the-middle attack = Application Layer proxy or IPS

Level 7: Application - SQL injection, buffer overrun attacks = IPS, Layer 7 Leverage Proxy System and scan income packets.

Screen Shot 2022-02-27 at 8 32 34 PM


Encryption Techniques and Fundamentals

  • Symmetric encryption 1 key (encrypt/decrypt same key)
    • AES:
  • Asymetric encryption 2 key pair
    • public

Network Security Operation

  • AES > DES
AES DES WEP WPA +TKIP WPA2 CCMP WPA3
128,192,256 56 bit only 40,104 variable 128-bit encription @packets CCMP SAE
Faster Slow replaced by WPA 8-63 Char+packets CCMP 802.11W encription of management frame

Wireless Attack Types


  • Deauth Attack: Dos (Denial of Service): Prevent access to Network, Fake HotSpot for U/P, Capture WPA Handshake !=====> WPA3 (or WPA2) with Good Passphrase
  • Fake Access: Fake hotspot =====> VPN

User Authentication and Access Control


  • AAA:
    • Authentication: MFA, Fob Token, Bio, Mobile devices
    • Authorization
    • Accounting

Device Hardening


Process to secure all hardwares

  • Change Default Passwords
  • Remove Unnecessary Logins
  • Enforce Strong Password Policy
  • Remove Unnecessary Services
  • Keep update Patches
  • Limit Physical access to the Device
  • Allow Change from a Trusted Network
    • Only inside Network can do
    • No Wireless Access or router allow
  • Require emcrption for Wireless Network
  • Audit Access
  • Backup: Off site
@kul1
Copy link
Author

kul1 commented Feb 28, 2022

Screen Shot 2022-02-27 at 8 32 34 PM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment