際際滷

際際滷Share a Scribd company logo
4
1鏝 The Internet (Cloud Icon at the Top)
The Internet is like a huge ocean of data where all websites, services,
and online platforms exist.
Your network (home or office) connects to this vast Internet through
an ISP (Internet Service Provider) like Jio, Airtel, or BSNL.
2鏝 Firewall (Black Box with Fire Symbol)
Before data enters your network, it first passes through the firewall.
The firewall checks if the data is safe or harmful. If it detects
malware, hacking attempts, or suspicious activity, it blocks the data.
3鏝 Router (Middle Device with Wi-Fi Signals)
If the firewall allows the data, it is sent to the router.
The router distributes Internet access to all connected devices (PCs, laptops, mobile
phones, etc.).
4鏝 Connected Devices (PCs, Laptops, Mobiles, Printer, Tablet, etc.)
These devices can now safely access the Internet for browsing, downloading, gaming,
and more.
Most read
15
HTTP vs HTTPS
HTTP (Hyper-Text Transfer Protocol)  Not Secure
HTTPS (Hyper-Text Transfer Protocol Secure)  Secure
WHY HTTP IS NOT SECURE?
1鏝 You connect to public Wi-Fi (like in a caf辿 or airport).
2鏝 You visit an http:// website (NOT encrypted).
3鏝 The hacker, also on the same Wi-Fi, runs a packet sniffer tool (like
Wireshark).
4鏝 This tool listens to and captures all data sent over the network.
5鏝 Since HTTP sends data as plain text, the hacker sees everythingyour
usernames, passwords, credit card details, and messages.
How to Stay Safe?
Use HTTPS websites (https://, secure).
Avoid public Wi-Fi for banking & logins.
Use a VPN to encrypt your data.
Most read
17
Networking For Ethical Hacking (Hackers)
Most read
Networking For Ethical Hacking (Hackers)
What is Networking?
Networking means connecting multiple devices (like
computers, phones, routers) so they can communicate and
share information with each other.
Example:
Imagine you have a Wi-Fi router at home.
Your phone, laptop, and TV are connected to it.
They can access the internet and even share files with each other.
Networking For Ethical Hacking (Hackers)
1鏝 The Internet (Cloud Icon at the Top)
The Internet is like a huge ocean of data where all websites, services,
and online platforms exist.
Your network (home or office) connects to this vast Internet through
an ISP (Internet Service Provider) like Jio, Airtel, or BSNL.
2鏝 Firewall (Black Box with Fire Symbol)
Before data enters your network, it first passes through the firewall.
The firewall checks if the data is safe or harmful. If it detects
malware, hacking attempts, or suspicious activity, it blocks the data.
3鏝 Router (Middle Device with Wi-Fi Signals)
If the firewall allows the data, it is sent to the router.
The router distributes Internet access to all connected devices (PCs, laptops, mobile
phones, etc.).
4鏝 Connected Devices (PCs, Laptops, Mobiles, Printer, Tablet, etc.)
These devices can now safely access the Internet for browsing, downloading, gaming,
and more.
Step-by-Step Journey of YouTube Data to Your Mobile
1鏝 You Open YouTube and Click a Video
Your mobile sends a request to YouTube to play a video.
This request is sent via the Internet to YouTubes servers.
2鏝 Your Request is Processed by YouTubes Servers
YouTubes servers are located in Google Data Centers across the world.
But YouTube does not always send data directly from the USA or other countries. Instead, it uses CDNs (Content Delivery
Networks).
3鏝 CDN (Content Delivery Network) Delivers the Video
YouTube has CDN servers in India (like in Mumbai, Chennai, Delhi, etc.).
These servers store copies of popular videos to reduce loading time.
If the video you requested is in a nearby CDN server, it sends the data quickly to your mobile.
If not, your request goes to a main YouTube server (Google Data Center), which then sends the data.
4鏝 Data Travels Through the Internet (ISP Networks)
YouTube data is broken into small packets and sent to your mobile.
These packets travel through undersea fiber optic cables, satellites, and local telecom networks to reach India.
Your ISP (Internet Service Provider) like Jio, Airtel, or BSNL routes the data to your mobile network.
5鏝 Mobile Network Delivers Data to Your Phone
The ISP sends the data to a cell tower near your location.
The tower transmits the video via 4G/5G signals to your mobile phone.
6鏝 Your Mobile Reassembles the Data and Plays the Video
Your phone receives the video packets, puts them together, and starts playing the YouTube video.
Important Networking Protocols
What is IPv4? (Old Address System)
IPv4 is like the old address system in a city, where there are only 4.3 billion
(430 crores) houses (addresses).
Looks like this: 192.168.1.1 (Just a way to write an address, dont worry about
the numbers).
The problem? Too many people moved in, and we ran out of addresses!
Example:
Imagine a small town planned for 4.3 billion houses, but suddenly 8 billion
people want to live there. Not enough houses for everyone!
The Problem:
If every device (phone, laptop, smart TV) needs a unique IPv4 address, we
dont have enough.
Solution? NAT (Network Address Translation)  Sharing Addresses!
IP Address (Internet Protocol Address) is a unique identifier assigned to each device on a
network.
What is NAT? (Sharing One Address Among Many Devices)
Since IPv4 ran out of addresses, we had to find a way to fit more people into the same
houses.
Solution: NAT (Network Address Translation)  It allows many devices to share a single IP
address.
Example:
Imagine an apartment building with only one main address (public IP).
Inside the building, each person has their own flat number (private IP).
When someone outside (the internet) sends a letter, it goes to the buildings main address,
and the receptionist (NAT) sends it to the correct flat.
How NAT Works in Networking:
Your home WiFi router has one public IP address (the buildings address).
All your devices (phone, laptop, smart TV) have private IPs (flat numbers).
The router (receptionist) manages who sent/received data and makes sure it reaches the right
device.
Problem with NAT:
It adds extra steps, making the internet slower.
It hides your real device, which is good for security but bad for some applications.
What is IPv6? (New Address System  No More Sharing!)
To fix this shortage, we created IPv6, which has trillions of addresses
 enough for every device to have its own unique address.
Looks like this: 2001:db8::8a2e:0370:7334 (No need to memorize it).
No need for NAT! Every device gets its own home, so no more
apartment sharing.
Example:
IPv6 is like building infinite houses, so everyone gets their own
address without sharing.
What is a MAC Address?
A MAC Address is a unique ID given to every network device (WiFi card,
Ethernet card, etc.) by the manufacturer.
It never changes, even if you switch networks.
It looks like this: 00:1A:2B:3C:4D:5E (12-digit hexadecimal format).
Every device has a different MAC address, just like every house has a
unique name.
Example:-
Your Wi-Fi router has a MAC address.
Your laptops network card has a MAC address.
Your mobile phones Wi-Fi has a MAC address.
Even if your IP address changes, your MAC address stays the same!
What is ARP?
ARP (Address Resolution Protocol) is like a phonebook for
networks.
It helps a device find the MAC address of another device using its
IP address.
Example:-
You want to visit House No. 192 (IP Address), but you dont know
its House Name (MAC Address).
You ask the security guard (ARP), who tells you, House No. 192 is
called Green Villa (MAC Address).
Now, you can send a message to the correct house!
Types of Spoofing in Networking
1鏝 MAC Spoofing  Changing Device ID (MAC Address)
Like changing your homes name to pretend to be another house.
Example: A hacker changes their MAC address to look like your Wi-Fi router and
steals your data.
2鏝 IP Spoofing  Faking Internet Address (IP Address)
Like writing a fake return address on a letter so no one knows where it really came
from.
Example: A hacker sends harmful data but hides their real IP address.
3鏝 ARP Spoofing  Tricking Devices to Send Data to Hacker
Like telling a delivery guy the wrong house address, so a package (data) goes to
the wrong place.
Example: A hacker pretends to be the Wi-Fi router, and your device unknowingly
sends data to them.
SUMMARY:-
DNS (Domain Name System)  The Internets Phonebook
Imagine you want to call a friend, but instead of remembering their 10-digit phone
number, you just save their name in your contacts. When you tap their name, your
phone automatically dials the correct number.
DNS does the same for the internet!
What is DNS?
DNS stands for Domain Name System.
It converts website names (like youtube.com) into IP addresses (like 142.250.183.206).
Computers dont understand namesthey only communicate using IP addresses.
Without DNS, we would have to type numbers instead of website names!
How DNS POISONING Works?
1鏝 You type google.com in your browser.
2鏝 Your device asks a DNS server for the correct IP address.
3鏝 A hacker injects a fake IP address into the DNS servers memory (cache).
4鏝 The DNS server sends you to a fake website instead of the real one.
5鏝 If you enter your password or details, the hacker steals them.
Hacking a DNS Server
Hackers break into a real DNS server and change records manually.
Now, everyone using that DNS gets redirected to the fake website.
Example: In 2018, hackers hijacked Amazons DNS to steal cryptocurrency.
Man-in-the-Middle (MITM) Attack
You connect to public Wi-Fi (like in a caf辿).
The hacker intercepts your request for google.com and sends a fake version.
You think it's real, enter your details, and the hacker steals your info.
Example: Fake free Wi-Fi hotspots trick people into visiting cloned websites.
How Hackers Change DNS Records? (DNS Spoofing)
HTTP vs HTTPS
HTTP (Hyper-Text Transfer Protocol)  Not Secure
HTTPS (Hyper-Text Transfer Protocol Secure)  Secure
WHY HTTP IS NOT SECURE?
1鏝 You connect to public Wi-Fi (like in a caf辿 or airport).
2鏝 You visit an http:// website (NOT encrypted).
3鏝 The hacker, also on the same Wi-Fi, runs a packet sniffer tool (like
Wireshark).
4鏝 This tool listens to and captures all data sent over the network.
5鏝 Since HTTP sends data as plain text, the hacker sees everythingyour
usernames, passwords, credit card details, and messages.
How to Stay Safe?
Use HTTPS websites (https://, secure).
Avoid public Wi-Fi for banking & logins.
Use a VPN to encrypt your data.
What is TCP and UDP?
Both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are rules for
sending data over the internet. They decide how information travels from one device to another.
TCP (Reliable but Slow)  Like a WhatsApp
Message
When you send a WhatsApp message , it
checks if the message is delivered.
If the message doesnt reach, it resends it.
Makes sure everything arrives in the correct
order.
Used for: Websites, emails, file downloads
(where accuracy matters).
Example: Downloading a file  TCP
makes sure every part of the file is received
correctly.
UDP (Fast but Unreliable)  Like a Live
Video Call
When you do a video call , the data must
be fast.
If some words or frames are lost, it doesnt
resend them.
Speed is more important than accuracy.
Used for: Gaming, live streaming, video calls
(where speed matters).
Example: Playing PUBG  UDP
ensures fast gameplay, even if some data is
lost.
Networking For Ethical Hacking (Hackers)

More Related Content

Recently uploaded (20)

State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...
State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...
State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...
Edge AI and Vision Alliance
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Safe Software
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and ImplementationAI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
Christine Shepherd
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdfIntro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Luiz Carneiro
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
Introduction to Typescript - GDG On Campus EUE
Introduction to Typescript - GDG On Campus EUEIntroduction to Typescript - GDG On Campus EUE
Introduction to Typescript - GDG On Campus EUE
Google Developer Group On Campus European Universities in Egypt
The case for on-premises AI
The case for on-premises AIThe case for on-premises AI
The case for on-premises AI
Principled Technologies
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptxHow to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lleDomino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
panagenda
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI ProfessionalOracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
Create Your First AI Agent with UiPath Agent Builder
Create Your First AI Agent with UiPath Agent BuilderCreate Your First AI Agent with UiPath Agent Builder
Create Your First AI Agent with UiPath Agent Builder
DianaGray10
AI Creative Generates You Passive Income Like Never Before
AI Creative Generates You Passive Income Like Never BeforeAI Creative Generates You Passive Income Like Never Before
AI Creative Generates You Passive Income Like Never Before
SivaRajan47
State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...
State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...
State-space Models vs. Transformers for Ultra-low-power Edge AI, a Presenta...
Edge AI and Vision Alliance
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Safe Software
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and ImplementationAI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
Christine Shepherd
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdfIntro際際滷s-May-BuildWithAi-EarthEngine.pdf
Intro際際滷s-May-BuildWithAi-EarthEngine.pdf
Luiz Carneiro
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptxHow to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lleDomino IQ  Was Sie erwartet, erste Schritte und Anwendungsf辰lle
Domino IQ Was Sie erwartet, erste Schritte und Anwendungsf辰lle
panagenda
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI ProfessionalOracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
Create Your First AI Agent with UiPath Agent Builder
Create Your First AI Agent with UiPath Agent BuilderCreate Your First AI Agent with UiPath Agent Builder
Create Your First AI Agent with UiPath Agent Builder
DianaGray10
AI Creative Generates You Passive Income Like Never Before
AI Creative Generates You Passive Income Like Never BeforeAI Creative Generates You Passive Income Like Never Before
AI Creative Generates You Passive Income Like Never Before
SivaRajan47

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter

Networking For Ethical Hacking (Hackers)

  • 2. What is Networking? Networking means connecting multiple devices (like computers, phones, routers) so they can communicate and share information with each other. Example: Imagine you have a Wi-Fi router at home. Your phone, laptop, and TV are connected to it. They can access the internet and even share files with each other.
  • 4. 1鏝 The Internet (Cloud Icon at the Top) The Internet is like a huge ocean of data where all websites, services, and online platforms exist. Your network (home or office) connects to this vast Internet through an ISP (Internet Service Provider) like Jio, Airtel, or BSNL. 2鏝 Firewall (Black Box with Fire Symbol) Before data enters your network, it first passes through the firewall. The firewall checks if the data is safe or harmful. If it detects malware, hacking attempts, or suspicious activity, it blocks the data. 3鏝 Router (Middle Device with Wi-Fi Signals) If the firewall allows the data, it is sent to the router. The router distributes Internet access to all connected devices (PCs, laptops, mobile phones, etc.). 4鏝 Connected Devices (PCs, Laptops, Mobiles, Printer, Tablet, etc.) These devices can now safely access the Internet for browsing, downloading, gaming, and more.
  • 5. Step-by-Step Journey of YouTube Data to Your Mobile 1鏝 You Open YouTube and Click a Video Your mobile sends a request to YouTube to play a video. This request is sent via the Internet to YouTubes servers. 2鏝 Your Request is Processed by YouTubes Servers YouTubes servers are located in Google Data Centers across the world. But YouTube does not always send data directly from the USA or other countries. Instead, it uses CDNs (Content Delivery Networks). 3鏝 CDN (Content Delivery Network) Delivers the Video YouTube has CDN servers in India (like in Mumbai, Chennai, Delhi, etc.). These servers store copies of popular videos to reduce loading time. If the video you requested is in a nearby CDN server, it sends the data quickly to your mobile. If not, your request goes to a main YouTube server (Google Data Center), which then sends the data. 4鏝 Data Travels Through the Internet (ISP Networks) YouTube data is broken into small packets and sent to your mobile. These packets travel through undersea fiber optic cables, satellites, and local telecom networks to reach India. Your ISP (Internet Service Provider) like Jio, Airtel, or BSNL routes the data to your mobile network. 5鏝 Mobile Network Delivers Data to Your Phone The ISP sends the data to a cell tower near your location. The tower transmits the video via 4G/5G signals to your mobile phone. 6鏝 Your Mobile Reassembles the Data and Plays the Video Your phone receives the video packets, puts them together, and starts playing the YouTube video.
  • 6. Important Networking Protocols What is IPv4? (Old Address System) IPv4 is like the old address system in a city, where there are only 4.3 billion (430 crores) houses (addresses). Looks like this: 192.168.1.1 (Just a way to write an address, dont worry about the numbers). The problem? Too many people moved in, and we ran out of addresses! Example: Imagine a small town planned for 4.3 billion houses, but suddenly 8 billion people want to live there. Not enough houses for everyone! The Problem: If every device (phone, laptop, smart TV) needs a unique IPv4 address, we dont have enough. Solution? NAT (Network Address Translation) Sharing Addresses! IP Address (Internet Protocol Address) is a unique identifier assigned to each device on a network.
  • 7. What is NAT? (Sharing One Address Among Many Devices) Since IPv4 ran out of addresses, we had to find a way to fit more people into the same houses. Solution: NAT (Network Address Translation) It allows many devices to share a single IP address. Example: Imagine an apartment building with only one main address (public IP). Inside the building, each person has their own flat number (private IP). When someone outside (the internet) sends a letter, it goes to the buildings main address, and the receptionist (NAT) sends it to the correct flat. How NAT Works in Networking: Your home WiFi router has one public IP address (the buildings address). All your devices (phone, laptop, smart TV) have private IPs (flat numbers). The router (receptionist) manages who sent/received data and makes sure it reaches the right device. Problem with NAT: It adds extra steps, making the internet slower. It hides your real device, which is good for security but bad for some applications.
  • 8. What is IPv6? (New Address System No More Sharing!) To fix this shortage, we created IPv6, which has trillions of addresses enough for every device to have its own unique address. Looks like this: 2001:db8::8a2e:0370:7334 (No need to memorize it). No need for NAT! Every device gets its own home, so no more apartment sharing. Example: IPv6 is like building infinite houses, so everyone gets their own address without sharing.
  • 9. What is a MAC Address? A MAC Address is a unique ID given to every network device (WiFi card, Ethernet card, etc.) by the manufacturer. It never changes, even if you switch networks. It looks like this: 00:1A:2B:3C:4D:5E (12-digit hexadecimal format). Every device has a different MAC address, just like every house has a unique name. Example:- Your Wi-Fi router has a MAC address. Your laptops network card has a MAC address. Your mobile phones Wi-Fi has a MAC address. Even if your IP address changes, your MAC address stays the same!
  • 10. What is ARP? ARP (Address Resolution Protocol) is like a phonebook for networks. It helps a device find the MAC address of another device using its IP address. Example:- You want to visit House No. 192 (IP Address), but you dont know its House Name (MAC Address). You ask the security guard (ARP), who tells you, House No. 192 is called Green Villa (MAC Address). Now, you can send a message to the correct house!
  • 11. Types of Spoofing in Networking 1鏝 MAC Spoofing Changing Device ID (MAC Address) Like changing your homes name to pretend to be another house. Example: A hacker changes their MAC address to look like your Wi-Fi router and steals your data. 2鏝 IP Spoofing Faking Internet Address (IP Address) Like writing a fake return address on a letter so no one knows where it really came from. Example: A hacker sends harmful data but hides their real IP address. 3鏝 ARP Spoofing Tricking Devices to Send Data to Hacker Like telling a delivery guy the wrong house address, so a package (data) goes to the wrong place. Example: A hacker pretends to be the Wi-Fi router, and your device unknowingly sends data to them.
  • 13. DNS (Domain Name System) The Internets Phonebook Imagine you want to call a friend, but instead of remembering their 10-digit phone number, you just save their name in your contacts. When you tap their name, your phone automatically dials the correct number. DNS does the same for the internet! What is DNS? DNS stands for Domain Name System. It converts website names (like youtube.com) into IP addresses (like 142.250.183.206). Computers dont understand namesthey only communicate using IP addresses. Without DNS, we would have to type numbers instead of website names!
  • 14. How DNS POISONING Works? 1鏝 You type google.com in your browser. 2鏝 Your device asks a DNS server for the correct IP address. 3鏝 A hacker injects a fake IP address into the DNS servers memory (cache). 4鏝 The DNS server sends you to a fake website instead of the real one. 5鏝 If you enter your password or details, the hacker steals them. Hacking a DNS Server Hackers break into a real DNS server and change records manually. Now, everyone using that DNS gets redirected to the fake website. Example: In 2018, hackers hijacked Amazons DNS to steal cryptocurrency. Man-in-the-Middle (MITM) Attack You connect to public Wi-Fi (like in a caf辿). The hacker intercepts your request for google.com and sends a fake version. You think it's real, enter your details, and the hacker steals your info. Example: Fake free Wi-Fi hotspots trick people into visiting cloned websites. How Hackers Change DNS Records? (DNS Spoofing)
  • 15. HTTP vs HTTPS HTTP (Hyper-Text Transfer Protocol) Not Secure HTTPS (Hyper-Text Transfer Protocol Secure) Secure WHY HTTP IS NOT SECURE? 1鏝 You connect to public Wi-Fi (like in a caf辿 or airport). 2鏝 You visit an http:// website (NOT encrypted). 3鏝 The hacker, also on the same Wi-Fi, runs a packet sniffer tool (like Wireshark). 4鏝 This tool listens to and captures all data sent over the network. 5鏝 Since HTTP sends data as plain text, the hacker sees everythingyour usernames, passwords, credit card details, and messages. How to Stay Safe? Use HTTPS websites (https://, secure). Avoid public Wi-Fi for banking & logins. Use a VPN to encrypt your data.
  • 16. What is TCP and UDP? Both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are rules for sending data over the internet. They decide how information travels from one device to another. TCP (Reliable but Slow) Like a WhatsApp Message When you send a WhatsApp message , it checks if the message is delivered. If the message doesnt reach, it resends it. Makes sure everything arrives in the correct order. Used for: Websites, emails, file downloads (where accuracy matters). Example: Downloading a file TCP makes sure every part of the file is received correctly. UDP (Fast but Unreliable) Like a Live Video Call When you do a video call , the data must be fast. If some words or frames are lost, it doesnt resend them. Speed is more important than accuracy. Used for: Gaming, live streaming, video calls (where speed matters). Example: Playing PUBG UDP ensures fast gameplay, even if some data is lost.