0% found this document useful (0 votes)
174 views15 pages

THD - (TCP-IP Network Study)

This document is an e-book that provides a complete study of TCP/IP networking for hackers, security researchers, and pentesters. It was created by Vivek, the founder of the blog Hack w0rm. The e-book covers topics like TCP, IP, HTTP, HTTPS, FTP, SMTP, POP3, SSH, SSL, and more across 7 pages. It provides definitions, examples, and explanations of these various networking protocols and how they work together using the TCP/IP model. The goal is to educate readers on network fundamentals in an accessible way.

Uploaded by

Ceh Djamel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views15 pages

THD - (TCP-IP Network Study)

This document is an e-book that provides a complete study of TCP/IP networking for hackers, security researchers, and pentesters. It was created by Vivek, the founder of the blog Hack w0rm. The e-book covers topics like TCP, IP, HTTP, HTTPS, FTP, SMTP, POP3, SSH, SSL, and more across 7 pages. It provides definitions, examples, and explanations of these various networking protocols and how they work together using the TCP/IP model. The goal is to educate readers on network fundamentals in an accessible way.

Uploaded by

Ceh Djamel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Hack w0rm

The w0rm Pirates

The Hacker Drive


Pack 1 (TCP/IP Network Study)
Complete Networking Study for Hackers, Pentesters & Security Researchers

Creator : Vivek (w0rm Pirate)


Hack w0rm Blog Follow us on Twitter
Ring us on G+

Become Facebook Fan


Join Facebook Group

Subscribe You Tube Channel

Creator & Introduction


The Hacker Drive
Part 1 Network Study The Hacker Drive (Pack 1 TCP/IP Network Study) is an E-book created by Vivek Founder & CEO of famous Blog Hack w0rm & Bolt Geek. This E-book is for beginners in Networking and hack related networks with complete guide & Explanation.
* Source : Google, W3schools, & Own Mixtures *

Index : The Hacker Drive ; Network Study


We'll start from Intro,Basic ,Explanation

1. TCP / IP 2. HTTP / HTTPS 3. FTP / RDP 4. SMTP / POP3 / SSH 5. SSL / Socks

Family of TCP & connection : Page 1


TCP - Transmission Control Protocol
TCP is used for transmission of data from an application to the network. TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP - Internet Protocol
IP takes care of the communication with other computers. IP is responsible for the sending and receiving data packets over the Internet.

HTTP - Hyper Text Transfer Protocol


HTTP takes care of the communication between a web server and a web browser. HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.

Family of TCP & connection : Page 2


HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web browser. HTTPS typically handles credit card transactions and other sensitive data.

SSL - Secure Sockets Layer


The SSL protocol is used for encryption of data for secure data transmission.

SMTP - Simple Mail Transfer Protocol


SMTP is used for transmission of e-mails.

MIME - Multi-purpose Internet Mail Extensions


The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.

Family of TCP & connection : Page 3


IMAP - Internet Message Access Protocol
IMAP is used for storing and retrieving e-mails.

POP - Post Office Protocol


POP is used for downloading e-mails from an e-mail server to a personal computer.

FTP - File Transfer Protocol


FTP takes care of transmission of files between computers.

NTP - Network Time Protocol


NTP is used to synchronize the time (the clock) between computers. DHCP - Dynamic Host Configuration Protocol DHCP is used for allocation of dynamic IP addresses to computers in a network.

Family of TCP & connection : Page 4


SNMP - Simple Network Management Protocol
SNMP is used for administration of computer networks.

LDAP - Lightweight Directory Access Protocol


LDAP is used for collecting information about users and e-mail addresses from the internet.

ICMP - Internet Control Message Protocol


ICMP takes care of error-handling in the network.

ARP - Address Resolution Protocol


ARP is used by IP to find the hardware address of a computer network card based on the IP address.

BOOTP - Boot Protocol


BOOTP is used for booting (starting) computers from the network.

TCP / IP : Page 1 Introduction & meaning


What is TCP/IP?
TCP/IP is the communication protocol for communication between computers on the Internet. TCP/IP stands for Transmission Control Protocol / Internet Protocol. TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.

TCP / IP Simple Example :


TCP/IP help our computer network to communicate with System Server. for Eg. Browsers and servers use TCP/IP to connect to the Internet. A browser uses TCP/IP to access a server. A server uses TCP/IP to send HTML back to a browser. Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails.

TCP / IP : Page 2 Work & Basic


TCP and IP works together. TCP takes care of the communication between your application software (i.e. your browser) and your network software. IP takes care of the communication with other computers. TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive. IP is responsible for sending the packets to the correct destination.

Inside TCP/IP
Inside the TCP/IP standard there are several protocols for handling data communication: TCP (Transmission Control Protocol) communication between applications UDP (User Datagram Protocol) simple communication between applications IP (Internet Protocol) communication between computers ICMP (Internet Control Message Protocol) for errors and statistics DHCP (Dynamic Host Configuration Protocol) for dynamic addressing

TCP / IP : Page 3 Connection Intro


TCP Uses a Fixed Connection : TCP is for communication between applications.
If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will set up a "full-duplex" communication between the two applications. The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications. UDP is very similar to TCP, but simpler and less reliable.

IP is Connection-Less
IP is a "connection-less" communication protocol. IP does not occupy the communication line between two computers. IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time. With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet. IP is responsible for "routing" each packet to the correct destination.

TCP / IP : Page 4 Connection Addressing & Understanding


TCP/IP uses 32 bits, or four numbers between 0 and 255, to address a computer.

IP Addresses
Each computer must have an IP address before it can connect to the Internet. Each IP packet must have an address before it can be sent to another computer. This is an IP address: 192.68.20.50 This might be the same IP address: www.w3schools.com

An IP Address Contains 4 Numbers.


Each computer must have a unique IP address. This is your IP address: 173.173.73.43 TCP/IP uses four numbers to address a computer. The numbers are always between 0 and 255. IP addresses are normally written as four numbers separated by a period, like this: 192.168.1.50.

TCP / IP : Page 5 Connection Addressing & Understanding


32 Bits = 4 Bytes In computer terms, TCP/IP uses 32 bits addressing. One byte is 8 bits. TCP/IP uses 4 bytes. One byte can contain 256 different values: 00000000, 00000001, 00000010, 00000011, 00000100, 00000101, 00000110, 00000111, 00001000 .......and all the way up to 11111111. Now you know why a TCP/IP address is four numbers between 0 and 255.

Domain Names
A name is much easier to remember than a 12 digit number. Names used for TCP/IP addresses are called domain names. w3schools.com is a domain name. When you address a web site, like http://www.w3schools.com, the name is translated to a number by a Domain Name Server (DNS). All over the world, DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses. When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information.

TCP / IP : Page 6 Connection Addressing & Understanding


When you write an email, you don't use TCP/IP. When you write an email, you use an email program like Lotus Notes, Microsoft Outlook or Netscape Communicator. Your email program uses different TCP/IP protocols: It sends your emails using SMTP It can download your emails from an email server using POP It can connect to an email server using IMAP

SMTP - Simple Mail Transfer Protocol


The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer. Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination. SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies. SMTP uses the MIME protocol to send binary data across TCP/IP networks. The MIME protocol converts binary data to pure text.

TCP / IP : Page 7 Connection Deep Understanding


POP - Post Office Protocol
The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server. If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.

IMAP - Internet Message Access Protocol


The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol. The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server. The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.

The End of TCP/IP Network


The Hacker Drive (Part 1 TCP/IP Network Study) Ends over here, Soon we'll create more e-books related Hacking, Networking, Linux, Programming & Geeks Stuffs. ****************************************************** Source of E-book is : W3Schools, Google & Own Mix ******************************************************
We created this E-book to fill entire TCP/IP and some other network information into one E-book & Distribute it, Don't forget knowledge is free & defination & examples are always same :) Hack w0rm Blog Follow us on Twitter
Ring us on G+

Become Facebook Fan


Join Facebook Group

Subscribe You Tube Channel

You might also like