Ethical Hacking and Penetration Testing Guide


Understanding Network Protocols



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə103/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   99   100   101   102   103   104   105   106   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Understanding Network Protocols
Having a solid introduction about network protocols is fundamental in the server exploitation 
phase; you just cannot attack a protocol without knowing how it works. I will not be explaining 
the ins and outs of every protocol because there are good resources available where you can learn 
about them, so I don’t need to reinvent the wheel. However, in this chapter, I will give a brief 
introduction to network protocols.
As a penetration tester, most of the times, you would come across only three protocols:
1. TCP (Transmission Control Protocol)
2. UDP (User Datagram Protocol)
3. ICMP (Internet Control Messaging Protocol)


164
◾ 
Ethical Hacking and Penetration Testing Guide
Transmission Control Protocol
Most of the Internet’s traffic is based upon TCP since it guarantees a reliable communication 
unlike UDP. Most of the protocols that we encounter in our daily lives are based upon TCP. 
Common examples are FTP, SMTP, Telnet, and HTTP.
TCP is used whenever we need to perform a reliable communication between a client and 
a server. TCP performs a reliable communication via the three-way handshake, which we have 
already discussed thoroughly in the “Network Sniffing” chapter (Chapter 6).
User Datagram Protocol
UDP is the exact opposite of TCP. It is used for faster communications. An example would be for 
video streaming, such as Skype (VOIP) communication. The advantage of this protocol over TCP 
is that it’s much faster and efficient. The disadvantage of UDP is that it does not guarantee that the 
packet will reach the destination, since it does not perform the three-way handshake, thus causing 
reliability issues. Some of the common UDP protocols that we will run into as a penetration tester 
are DNS and SQL Server.

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   99   100   101   102   103   104   105   106   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin