164
◾
Ethical Hacking and Penetration Testing Guide
Transmission Control Protocol
Most of the Internet’s traffic is based upon TCP since it guarantees a reliable communication
unlike UDP. Most of the protocols that we encounter in our daily lives are based upon TCP.
Common
examples are FTP, SMTP, Telnet, and HTTP.
TCP is used whenever we need to perform a reliable communication between a client and
a server. TCP performs a reliable communication
via the three-way handshake, which we have
already discussed thoroughly in the “Network Sniffing” chapter (Chapter 6).
User Datagram Protocol
UDP is the exact opposite of TCP. It is used for faster communications. An example would be for
video
streaming, such as Skype (VOIP) communication. The advantage of this protocol over TCP
is that it’s much faster and efficient. The disadvantage of UDP is that it
does not guarantee that the
packet will reach the destination, since it does not perform
the three-way handshake, thus causing
reliability issues. Some of the common UDP protocols that we will run into
as a penetration tester
are DNS and SQL Server.
Dostları ilə paylaş: