TCM Security Academy Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • TCM Security Academy Notes
  • Courses
    • TCM - Linux 101
      • 1. Introduction
        • Linux Distributions
        • Installing Linux
      • 2. Command Line
        • Intro to Command Line
        • Getting help on the Command Line
        • Command Line Arguments and Options
        • Reading Text Files
      • 3. File System
        • Filesystem Hierarchy Standard
        • Devices, Partitions and Mounting
        • Absolute and Relative Paths
        • Files and Directories
        • Paths, Filenames and Text Files
        • Filesystem Links
        • Archiving and Searching Files
      • 4. Users and Groups
        • Working with Users and Groups
        • File and Directory Permissions
        • Changing Users and Passwords
      • 5. Installing Software
        • Package Management
      • 6. Shells
        • Common Command Line Shells
        • Environment Variables & Startup Files
        • Input/Output Redirection
        • Command History & Substitution
      • 7. Utilities and File Editors
        • Searching and Processing Text
        • Networking at the Command Line
        • File Transfer
        • Text Editors and Converters
      • 8. Process Management
        • Process Information
        • Foreground and Background Processes
        • Managing Processes
        • Scheduling Processes
      • 9. Regular Expressions
        • Regular Expressions, Searching, Replacing, Building
      • 10. Bash Scripting
        • Bash Scripting Basics, Control Structures, Loops
      • 🌐Linux101 References
    • TCM - Mobile Application Penetration Testing
      • 1. Introduction & Mobile Pentesting
      • 2. Android Security
      • 3. Android Lab Setup
      • 4. Android Static Analysis
      • 5. Android Dynamic Analysis
      • 6. Android Bug Bounty
      • 7. iOS Security
      • 8. iOS Lab Setup
      • 9. iOS Static Analysis
      • 10. iOS Dynamic Analysis
      • 11. iOS Bug Bounty
      • 🌐MAPT References
    • TCM - Practical Ethical Hacking
      • 1. Introduction & Networking
      • 2. Lab Set Up, Linux & Python
        • Intro to Kali Linux
        • Intro to Python
      • 3. The Ethical Hacker Methodology
        • Information Gathering
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • Capstone Practical Labs
      • 4. Active Directory
        • Active Directory Lab
        • AD - Initial Attack Vectors
        • AD - Post-Compromise Enumeration
        • AD - Post-Compromise Attacks
        • AD - Additional Attacks
        • AD - Case Studies
      • 5. Post Exploitation
      • 6. Web Application
        • Web App Lab Setup
        • Web App - SQL Injection
        • Web App - XSS
        • Web App - Command Injection
        • Web App - Insecure File Upload
        • Web App - Authentication Attacks
        • Web App - XXE
        • Web App - IDOR
        • Web App - Capstone Practical Lab
      • 7. Wireless Attacks
      • 8. Legal Documentation & Report Writing
      • 🌐PEH References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Intro
  • Network Assessments
  • Report
  • Debrief
  • Networking
  • Common TCP Ports
  • Common UDP Ports
  • OSI Model
  • Subnetting

Was this helpful?

Edit on GitHub
  1. Courses
  2. TCM - Practical Ethical Hacking

1. Introduction & Networking

PreviousTCM - Practical Ethical HackingNext2. Lab Set Up, Linux & Python

Last updated 3 months ago

Was this helpful?


Intro

Ethical hackers are allowed and hired to try to hack into an organization by assessing its security posture.

Network Assessments

  • External Pentest - hacking/assessing from outside of the organization's network

    • OSINT (Open-Source Intelligence) - organization's users, web login pages, emails, etc

    • Vulnerability scanning from the Internet

    • Pentest takes 32-40 hours on average and 8-16 hours for report writing

  • Internal Pentest - assessing from the inside of the organization's network

    • Active Directory attacks

    • Pentest takes 32-40 hours on average (longer if bigger scope ) and 8-16 hours for report writing

  • Web Application Pentest - assessing the web application security

    • Web-based attacks & guidelines

    • Pentest takes a minimum of 32-40 hours and 8-16 hours for report writing

  • Wireless Pentest - assessing the wireless network security

    • Guest, WPA2-PSK, WPA2 Enterprise - pentesting with external Wireless adapters

    • Takes 4-8 hours per SSID and 2-4 for report writing

  • Physical & Social Engineering Pentest - assessing an organization's physical security

    • On site badges cloning, social engineering, picking locks, etc - depends on the client's goal

    • Phishing, Vishing, Smishing campaigns

    • Lasts 16-40 hours and 4-8 for report writing

  • Mobile Pentesting, IoT Pentesting, Red Team Engagements (weeks, months), Purple Team Engagements, Car Hacking, etc

⬇️

Report

  • Good technical skills, report writing, communication and presentation skills

  • Report withing a week

    • Executive Summary - a non-technical report

    • Technical findings section - for the technicians

    • Recommendations for remediation - clear to both executives and tech staff

⬇️

Debrief

  • The client (both technical and executive staff) is taken through the report findings.

  • Client can ask questions and address any concerns

  • Release the final report


Networking

ifconfig
ipconfig /all

➡️ Layer 3

IP (Internet Protocol) addresses - identify/locate devices on a network, on the layer 3 OSI model.

  • IPv4 Address: 192.168.1.50 - decimal notation

    • 4 octets of 8 bits = 32bits = 4bytes

    • Total IPv4 addresses

      232=4.294.967.2962^{32} = 4.294.967.296232=4.294.967.296
  • IPv6 Address: fe80::ab4c:8503:3248:9993%6 - hexadecimal notation

    • 8 groups of 4 hex digits = 128bits

    • Total IPv4 addresses

      2128=3.4×10382^{128} = 3.4×10^{38}2128=3.4×1038

➡️ Layer 2

MAC (Media Access Control) access is a unique identifier/hardware address given to NICs (network interface controllers). Used at the layer 2 OSI model (data link).

  • MAC Address: 00:50:56:C0:00:01 - hexadecimal notation

    • 6 pairs of hex digits = 48 bits

    • First 3 pairs = NIC manufacturer

    • local network

➡️ Layer 4

TCP (Transmission Control Protocol)

  • Connection oriented, high reliability, guaranteed delivery

UDP (User Datagram Protocol)

  • Connectionless, lightweight, no acknowledgement/reliability, real-time apps

Common TCP Ports

TCP Ports
Service

21 / 990

FTP (File Transfer Protocol) / FTPS (FTP over SSL/TLS)

22

SSH (Secure Shell)

23

Telnet

25

SMTP (Simple Mail Transfer Protocol)

53

DNS (Domain Name System)

80 / 443

HTTP / HTTPS (Hypertext Transfer Protocol over SSL)

110

POP3 (Post Office Protocol)

123

NTP (Network Time Protocol)

139 / 445

NetBIOS / SMB, Samba (Server Message Block)

143

IMAP (Internet Message Access Protocol)

389

LDAP (Lightweight Directory Access Protocol)

1433-1434

Microsoft Sql Server

3306

MySQL

3389

RDP (Terminal Server)

Common UDP Ports

UDP Ports
Service

53

DNS (Domain Name System)

67 / 68

DHCP (Dynamic Host Configuration Protocol)

69

TFTP (Trivial File Transfer Protocol)

161

SNMP (Simple Network Management Protocol)

389

LDAP (Lightweight Directory Access Protocol)

OSI Model

➡️ OSI (Open Systems Interconnection) model is a conceptual framework that offers a 7 layers structured method for communication system functions and network protocols.

Please ➡️ 1. Physical

  • data cables

Do ➡️ 2. Data Link

  • Switching, MAC

Not ➡️ 3. Network

  • IPs, Routing

Throw ➡️ 4. Transport

  • TCP/UDP

Sausage ➡️ 5. Session

  • Session management

Pizza ➡️ 6. Presentation

  • Media files

Away ➡️ 7. Application

  • HTTP, SMTP, apps

Subnetting

Subnetting consists of dividing a network into multiple subnetworks/subnets.

  • Subnet - own range of IP addresses

  • NAT (Network Address Translation) prevents from running out of IPv4 addresses

CIDR (Classless Inter-Domain Routing) notation

  • 192.168.1.0/24 - /xx is the network prefix length (network portion bits number)

    • 24 bits = network portion (turned on bits)

    • (remaining) 8 bits = host portion

    • Total hosts

      (28=256)−2=254(2^{8} = 256)-2=254(28=256)−2=254
    • Subnet Mask = 255.255.255.0

  • Network ID - First Address 192.168.1.0

  • Broadcast - Last Address 192.168.1.255


🔗

: SYN ➡️ SYN ACK ➡️ ACK = Connection established

🔗

🔗

🔗

🔗

🔗

🔗

🔗

OWASP
Networking Fundalmentals - Practical Networking Youtube
3 Way Handshake
guru99 - OSI Model Layers
SMB University - Cisco Networking Fundamentals
Subnetting Mastery - Practical Networking Youtube
Subnet Guide - TCM
Subnet Calculator - vultr.com
Subnet Calculator - mxtoolbox.com
CIDR to IPv4 Conversion
OSI Model - guru99.com
Seven layers of OSI model - community.fs.com
OSI Model Cyber Attacks - byos.io
TCM Subnetting Sheet