Showing posts with label Network Penetration. Show all posts
Showing posts with label Network Penetration. Show all posts

Friday, 19 May 2023

Basic of Network

 

Basic of Network

A network is a group of two or more devices that are connected to each other to share data or share resources. A network contains several different computer systems that are connected by a physical or wireless connection like a server or router. This router has direct access to the internet. The device can only connect to the internet through the router or access point.

For example: Suppose the client or device is connected to the network through Wi-Fi or Ethernet. If the client opens the browser and types google.com, then your computer will send a request to the router for asking google.com. The router will go to the internet and request google.com. The router will receive google.com and forward that response to the computer. Now the client can see google.com on the browser as a result.

Basic of Network

In networking, devices on the same network communicate with each other using packets. If you send a video, log in to a website, send chat messages, sending an email, all the data is sent as packets. In networking, devices ensure that these packets go in the right direction using the Mac address. Each packet has the source mac and destination mac, and it flows from the source mac to the destination mac.

Network Penetration Testing

 


Network Penetration Testing

Network penetration testing is the first penetration testing that we are going to cover in this section. Most of the systems and computers are connected to a network. If a device is connected to the internet, that means the device is connected to the network because the internet is a really big network. Therefore, we need to know that how devices interact with each other in a network, as well as how networks works.

Network penetration testing is divided into 3 subsections:

  1. Pre-connection attacks: In this section, we will learn about all the attacks that we can do before connecting to a network.
  2. Gaining attacks: In this section, we will learn that how to crack Wi-Fi keys and gain access to Wi-Fi network whether they use WEP/WPA/WPA2 network.
  3. Post-connection attacks: These attacks apply whenever you are able to connect to the network. In this section, you will learn the number of powerful attacks that will allow you to intercept the connections and capture everything like the user-name, password, URL, chat messages. You can also modify the data as it has been sent in the air. These attacks can apply on both Wi-Fi or wired networks.