What is Networking? - Networking Basics

00:23:32
https://www.youtube.com/watch?v=42u_2e6eNF4

概要

TLDRAng video na ito ay nagbibigay ng isang pangkalahatang-ideya ng mga pangunahing konsepto ng networking sa computer. Tinalakay ang mga uri ng network, ang internet, at ang mga device na konektado sa mga network. Ipinakita ang mga halimbawa ng mga network sa pang-araw-araw na buhay at ang kanilang kahalagahan sa cybersecurity. Ang mga pangunahing terminolohiya tulad ng IP address, MAC address, at ang pagkakaiba sa pagitan ng private at public networks ay ipinaliwanag. Ang video ay nagbigay din ng impormasyon tungkol sa mga protocol na ginagamit sa networking at ang mga tool tulad ng ping na ginagamit upang suriin ang koneksyon sa pagitan ng mga device.

収穫

  • 🌐 Ang networking ay ang pagkonekta ng mga device.
  • 📡 Ang internet ay isang malaking network ng mga maliliit na network.
  • 🔍 Ang IP address ay natatanging address ng device sa network.
  • 🔑 Ang MAC address ay natatanging address ng network interface.
  • 🏠 Ang private networks ay para sa mga organisasyon o tahanan.
  • 🌍 Ang public networks ay accessible sa lahat.
  • 📜 Ang mga protocol ay mga patakaran sa networking.
  • 📊 Ang ping ay ginagamit upang suriin ang koneksyon.
  • 🆕 Ang IPv6 ay mas bagong bersyon ng IP addressing.
  • 🔄 Ang ICMP ay ginagamit sa mga ping command.

タイムライン

  • 00:00:00 - 00:05:00

    Sa unang bahagi ng video, ipinakilala ang konsepto ng networking, na tumutukoy sa koneksyon ng mga bagay, tulad ng mga tao at teknolohiyang aparato. Ang mga halimbawa ng networking ay kinabibilangan ng mga sistema ng pampasaherong transportasyon at mga imprastruktura tulad ng power grid. Sa konteksto ng computing, ang networking ay mahalaga para sa komunikasyon sa pagitan ng mga device, mula sa mga smartphone hanggang sa mga traffic lights.

  • 00:05:00 - 00:10:00

    Sa ikalawang bahagi, tinalakay ang internet bilang isang malaking network na binubuo ng maraming maliliit na network. Ang unang bersyon ng internet ay nagsimula sa ARPANET noong 1960s, at ang World Wide Web ay naimbento ni Tim Berners-Lee noong 1990. Ang mga pribadong network ay kumokonekta sa mga pampublikong network, at ang mga device ay gumagamit ng mga label upang makilala ang kanilang sarili sa network.

  • 00:10:00 - 00:15:00

    Sa ikatlong bahagi, ipinaliwanag ang mga paraan ng pagkilala sa mga device sa isang network, tulad ng IP address at MAC address. Ang IP address ay nag-iiba-iba at ginagamit upang makilala ang isang host sa network, habang ang MAC address ay isang natatanging identifier na hindi nagbabago. Ang mga protocol ay mahalaga para sa pagkakaunawaan sa pagitan ng mga device sa network, at ang mga IP address ay maaaring maging pampubliko o pribado.

  • 00:15:00 - 00:23:32

    Sa huling bahagi, tinalakay ang ping at ang paggamit ng ICMP upang sukatin ang pagganap ng koneksyon sa pagitan ng mga device. Ang ping ay isang pangunahing tool sa networking na ginagamit upang suriin kung ang koneksyon ay umiiral at maaasahan. Ang mga tagubilin sa paggamit ng ping at ang mga kaugnay na tanong ay ibinigay upang matulungan ang mga manonood na maunawaan ang mga konsepto ng networking.

もっと見る

マインドマップ

ビデオQ&A

  • Ano ang networking?

    Ang networking ay ang pagkonekta ng mga device upang makipag-ugnayan at magbahagi ng impormasyon.

  • Ano ang internet?

    Ang internet ay isang malaking network na binubuo ng maraming maliliit na network.

  • Ano ang IP address?

    Ang IP address ay isang natatanging address na ginagamit upang makilala ang isang device sa network.

  • Ano ang MAC address?

    Ang MAC address ay isang natatanging address na ibinibigay sa network interface ng isang device.

  • Ano ang ping?

    Ang ping ay isang tool na ginagamit upang suriin ang koneksyon sa pagitan ng mga device gamit ang ICMP.

  • Ano ang pagkakaiba ng private at public networks?

    Ang private networks ay ginagamit sa loob ng isang organisasyon o tahanan, habang ang public networks ay accessible sa lahat.

  • Sino ang nag-imbento ng World Wide Web?

    Si Tim Berners-Lee ang nag-imbento ng World Wide Web.

  • Ano ang mga protocol sa networking?

    Ang mga protocol ay mga patakaran na nagtatakda kung paano nakikipag-ugnayan ang mga device sa network.

  • Ano ang IPv4 at IPv6?

    Ang IPv4 ay ang unang bersyon ng IP addressing, habang ang IPv6 ay ang mas bagong bersyon na sumusuporta sa mas maraming device.

  • Ano ang ICMP?

    Ang ICMP ay ang Internet Control Message Protocol na ginagamit sa mga ping command.

ビデオをもっと見る

AIを活用したYouTubeの無料動画要約に即アクセス!
字幕
en
オートスクロール:
  • 00:00:00
    hey everyone welcome back to another
  • 00:00:01
    video here on tryhackme
  • 00:00:03
    today we're going to be taking a look at
  • 00:00:04
    the room what is networking
  • 00:00:06
    begin learning the fundamentals of
  • 00:00:08
    computer networking in this
  • 00:00:10
    bite size and interactive module this is
  • 00:00:12
    a really cool module this is uh
  • 00:00:14
    i believe had some new technology
  • 00:00:16
    introduced into it by our developers
  • 00:00:18
    very excited to go through this and it
  • 00:00:20
    should be a nice one
  • 00:00:21
    let's go ahead and dive into task one
  • 00:00:23
    what is networking
  • 00:00:26
    networks are simply things connected for
  • 00:00:29
    example
  • 00:00:30
    your friendship circle you are all
  • 00:00:31
    connected because of similar interests
  • 00:00:33
    hobbies skills and uh different sorts of
  • 00:00:36
    things
  • 00:00:37
    and this is sort of where the term
  • 00:00:38
    networking comes from if you are doing
  • 00:00:40
    job hunting or other things like that
  • 00:00:42
    as you know someone who knows someone
  • 00:00:44
    things like that
  • 00:00:46
    networks can be found in all walks of
  • 00:00:47
    life a city's public transportation
  • 00:00:49
    system
  • 00:00:50
    the london tube is a great example of
  • 00:00:52
    this because it is a very well and
  • 00:00:54
    interconnected network and it's a very
  • 00:00:56
    big one too infrastructure such
  • 00:00:59
    as the national power grid for
  • 00:01:00
    electricity another very important
  • 00:01:02
    network
  • 00:01:03
    meeting and greeting your neighbors
  • 00:01:04
    again it's not a more of a safety
  • 00:01:06
    network in that case
  • 00:01:07
    the postal system for sending letters
  • 00:01:09
    and parcels and so on and so forth you
  • 00:01:10
    can see networks everywhere in your life
  • 00:01:12
    and they're very very important concepts
  • 00:01:14
    but more specifically in computing
  • 00:01:16
    networking is the same idea
  • 00:01:18
    just dispersed to technological devices
  • 00:01:22
    take your phone as an example the reason
  • 00:01:24
    that you have
  • 00:01:25
    it is to access things because if it
  • 00:01:27
    didn't do anything it'd be kind of like
  • 00:01:29
    an old uh
  • 00:01:30
    i don't know an old palm pilot or an old
  • 00:01:33
    pda
  • 00:01:34
    where you know it's not that much good
  • 00:01:35
    it can it may be a calculator
  • 00:01:38
    disputing the claim that your teacher
  • 00:01:39
    would say that you wouldn't have a
  • 00:01:41
    calculator carried around in your pocket
  • 00:01:43
    all the time
  • 00:01:44
    but you can see the importance of
  • 00:01:45
    networks we'll cover how these devices
  • 00:01:47
    communicate with each other in the rules
  • 00:01:49
    that
  • 00:01:49
    follow in computing a network can be
  • 00:01:52
    formed
  • 00:01:52
    by anywhere from two devices to billions
  • 00:01:56
    so
  • 00:01:56
    it doesn't really matter as long as it's
  • 00:01:58
    more than or two or more
  • 00:01:59
    these devices include everything from
  • 00:02:01
    your laptop and phone
  • 00:02:03
    to security cameras traffic lights and
  • 00:02:05
    even farming
  • 00:02:07
    networks are integrated into our
  • 00:02:09
    everyday life
  • 00:02:10
    be it gathering data for the weather
  • 00:02:12
    delivering electricity to homes
  • 00:02:14
    or even determining who has the right
  • 00:02:16
    way at
  • 00:02:17
    a road right of way rather because
  • 00:02:20
    networks are so embedded in the modern
  • 00:02:22
    day
  • 00:02:23
    networking is an essential concept to
  • 00:02:24
    grasp in cyber security
  • 00:02:26
    take the diagram below as an example
  • 00:02:29
    alice bob
  • 00:02:29
    and jim have formed their note or their
  • 00:02:31
    own network
  • 00:02:32
    we'll come on to this a bit later we'll
  • 00:02:36
    talk about this a little bit later on so
  • 00:02:37
    you can see just a basic network
  • 00:02:39
    networks come in all shapes and sizes
  • 00:02:42
    which is something that will also come
  • 00:02:44
    on to discuss throughout this module
  • 00:02:46
    let's go ahead and dive into the
  • 00:02:47
    question
  • 00:02:48
    what is the key term for devices that
  • 00:02:50
    are
  • 00:02:51
    connected together that is a network
  • 00:02:55
    and there we go we'll go ahead and close
  • 00:02:58
    that
  • 00:02:58
    and let's go ahead and go into task two
  • 00:03:00
    what is the internet
  • 00:03:05
    now that we've learned what a network is
  • 00:03:06
    and how one is defined in computing
  • 00:03:08
    just devices that are connected let's
  • 00:03:10
    explore the internet
  • 00:03:11
    the internet is one gigantic network
  • 00:03:14
    that consists of
  • 00:03:15
    many many small networks within itself
  • 00:03:18
    using our example from the previous task
  • 00:03:20
    let's now imagine that alice made some
  • 00:03:22
    new friends
  • 00:03:23
    named zayn and toby that she wants to
  • 00:03:26
    introduce to bob and jim
  • 00:03:27
    this is starting to sound like an office
  • 00:03:29
    reference the problem is
  • 00:03:30
    that alice is the only person who speaks
  • 00:03:33
    the same language as zayn and toby
  • 00:03:35
    so alice will have to be the messenger
  • 00:03:37
    and you can see that alice is here in
  • 00:03:38
    the middle
  • 00:03:39
    where she's the messenger for these two
  • 00:03:42
    because alice can speak both languages
  • 00:03:44
    they can communicate to one another
  • 00:03:46
    through alice forming a new network the
  • 00:03:49
    first iteration of the internet
  • 00:03:51
    was within the arpanet project in the
  • 00:03:53
    late 1960s
  • 00:03:55
    this project was funded by the united
  • 00:03:56
    states department of defense
  • 00:03:58
    or defense department and was the first
  • 00:04:00
    documented network in action
  • 00:04:02
    however it wasn't until 1909 when the
  • 00:04:05
    internet as we know it was invented by
  • 00:04:07
    tom or tim
  • 00:04:08
    berners-lee by the creation of the world
  • 00:04:10
    wide web or
  • 00:04:11
    otherwise shortened to www it wasn't
  • 00:04:14
    until this
  • 00:04:15
    point that the internet was used as a
  • 00:04:17
    repository for storing and sharing
  • 00:04:18
    information
  • 00:04:19
    like it is today let's relate alice's
  • 00:04:22
    network of friends to computing devices
  • 00:04:24
    the internet looks like a much larger
  • 00:04:26
    version of this diagram
  • 00:04:28
    and you can see this is a very
  • 00:04:30
    abbreviated
  • 00:04:31
    intensely abbreviated version of the
  • 00:04:32
    internet where we have many small
  • 00:04:34
    networks
  • 00:04:35
    that are interconnected with a
  • 00:04:37
    translating device in the form of a
  • 00:04:38
    router
  • 00:04:39
    even though this is not necessarily
  • 00:04:41
    translating it's nat
  • 00:04:42
    and pat don't worry about that right now
  • 00:04:45
    just know that this is just a way that
  • 00:04:47
    we have gateways
  • 00:04:48
    for our private networks to talk to the
  • 00:04:49
    internet
  • 00:04:51
    as previously stated the internet is
  • 00:04:52
    made up of many small networks all
  • 00:04:54
    joined together
  • 00:04:56
    these small networks are called private
  • 00:04:58
    networks so think your home network a
  • 00:05:00
    business network things like that
  • 00:05:01
    where networks connecting these small
  • 00:05:03
    networks are called public networks
  • 00:05:05
    try saying that 10 times fast or the
  • 00:05:07
    internet so to recap
  • 00:05:09
    a network can be one of two types a
  • 00:05:12
    private network
  • 00:05:13
    or a public network devices will use a
  • 00:05:16
    set of labels to identify themselves on
  • 00:05:18
    a network
  • 00:05:19
    which we will come onto in the task
  • 00:05:21
    below so who invented the worldwide
  • 00:05:24
    web that will be tim i'm gonna have to
  • 00:05:27
    grab his name from up here
  • 00:05:28
    because i can't spell it tim berners-lee
  • 00:05:31
    and we can just copy that
  • 00:05:34
    and there we go if i don't leave the
  • 00:05:37
    other part of the answer on there
  • 00:05:39
    all right perfect let's move into task
  • 00:05:41
    three identifying devices on a network
  • 00:05:46
    to communicate and maintain order
  • 00:05:48
    devices must be both identifying and
  • 00:05:51
    identifiable on a network what use
  • 00:05:54
    is it if you don't know whom you're
  • 00:05:56
    talking to at the end of the day
  • 00:05:58
    you know if just yelling into the void
  • 00:06:00
    and the void starts talking back that's
  • 00:06:01
    a little strange
  • 00:06:03
    devices on a network are very similar to
  • 00:06:04
    humans in the fact that we have
  • 00:06:06
    two ways of being identified via our
  • 00:06:09
    name and our fingerprints
  • 00:06:10
    among a couple other things but those
  • 00:06:12
    are good generalizations
  • 00:06:14
    now we have can change our name through
  • 00:06:16
    deed uh
  • 00:06:18
    poll but however uh we can't change our
  • 00:06:21
    fingerprints so
  • 00:06:22
    we can change your name we can't change
  • 00:06:23
    our fingerprints that's the general gist
  • 00:06:24
    of this
  • 00:06:25
    every human has a an identical set or
  • 00:06:28
    individual set of fingerprints which
  • 00:06:29
    means that even if they change their
  • 00:06:31
    name
  • 00:06:31
    there is still an identity behind it the
  • 00:06:34
    general idea behind this
  • 00:06:36
    is that yes you can change the
  • 00:06:39
    what you're called and that's something
  • 00:06:41
    that you know you might have a nickname
  • 00:06:42
    or other things like that
  • 00:06:44
    but you're always going to have some
  • 00:06:46
    permanently identifiable marks
  • 00:06:48
    and computers have the same thing
  • 00:06:49
    devices have the same thing they have an
  • 00:06:51
    ip address which can change
  • 00:06:53
    but they have a what's in theory a
  • 00:06:56
    globally unique
  • 00:06:57
    mac address or a media access control
  • 00:06:59
    address you can see that right there
  • 00:07:01
    think of it it's kind of similar to a
  • 00:07:02
    serial number but these are all
  • 00:07:03
    standardized
  • 00:07:05
    and it's split up in a couple of
  • 00:07:06
    different ways where the first half is
  • 00:07:07
    the manufacturer and the second part is
  • 00:07:09
    the
  • 00:07:10
    unique part i won't go too far into this
  • 00:07:12
    but just know that
  • 00:07:13
    well you can be called different things
  • 00:07:15
    your mac address is
  • 00:07:16
    generally in theory globally unique
  • 00:07:20
    ip addresses briefly an ip address or
  • 00:07:23
    internet protocol address can be used as
  • 00:07:26
    a way of identifying a host on a network
  • 00:07:28
    for a period of time
  • 00:07:29
    where that ip address can then be
  • 00:07:31
    associated with another device
  • 00:07:32
    without the ip address changing first
  • 00:07:35
    let's split up
  • 00:07:35
    precisely what an ip address is in the
  • 00:07:38
    diagram below
  • 00:07:39
    so before we go into this think of this
  • 00:07:41
    as your street address
  • 00:07:42
    other people can live there you probably
  • 00:07:44
    aren't the only person that's lived at
  • 00:07:46
    that address and you might not be
  • 00:07:47
    the only person you know using that
  • 00:07:49
    computer at that address
  • 00:07:50
    uh and this can change hands and it
  • 00:07:52
    might change over time with you know
  • 00:07:54
    people changing the way that the address
  • 00:07:56
    system is set up for streets
  • 00:07:57
    things like that but this is how we know
  • 00:08:00
    how to send
  • 00:08:01
    mail to you and the same thing goes for
  • 00:08:03
    computers an ip address is a set of
  • 00:08:05
    numbers
  • 00:08:06
    that are divided into four octets and
  • 00:08:08
    you can see one here
  • 00:08:09
    one here one here and then one here and
  • 00:08:12
    you can see that these have a range of
  • 00:08:13
    zero to two hundred and fifty-five
  • 00:08:15
    uh this is because they're made up of
  • 00:08:17
    eight binary bits
  • 00:08:19
    if i remember correctly and uh they the
  • 00:08:22
    range for that is zero with all the bits
  • 00:08:25
    being turned off
  • 00:08:26
    and then if you turn the model once or
  • 00:08:28
    everything is on
  • 00:08:29
    your limit is 255. the value of each
  • 00:08:33
    octet
  • 00:08:33
    will summarize to be the ip address of
  • 00:08:37
    the device on the network so all of
  • 00:08:38
    these put together
  • 00:08:40
    the individual octets can mean things
  • 00:08:42
    but generally speaking
  • 00:08:43
    don't worry about that right now this is
  • 00:08:45
    your straight address on the network
  • 00:08:47
    it's
  • 00:08:47
    how your computer knows to talk to
  • 00:08:49
    someone else so this might be your
  • 00:08:50
    router's address on your home network uh
  • 00:08:52
    this actual network itself is pretty
  • 00:08:56
    common
  • 00:08:57
    for home networks so 192.168.1.
  • 00:09:01
    and this last bit would be what changes
  • 00:09:03
    or sometimes this is a zero but these
  • 00:09:05
    first two
  • 00:09:05
    pretty common for home networks and
  • 00:09:07
    that's where you have the first and
  • 00:09:08
    second octet
  • 00:09:10
    or octets that are static i won't go too
  • 00:09:12
    far into that but just know that this
  • 00:09:14
    might be a router address it's very
  • 00:09:16
    common for that
  • 00:09:17
    uh what's important to understand here
  • 00:09:19
    is that the ip addresses can change from
  • 00:09:20
    device to device but they cannot
  • 00:09:22
    be active simultaneously more than once
  • 00:09:25
    so if you have a street address
  • 00:09:26
    your neighbor can't have the same one
  • 00:09:29
    you can swap houses with your neighbor
  • 00:09:31
    and that'd be a little weird
  • 00:09:32
    but you could you will have a different
  • 00:09:34
    address living at that house
  • 00:09:35
    you can't have that collision because
  • 00:09:37
    that causes problems and both of the
  • 00:09:39
    devices will say hold on
  • 00:09:40
    we need to figure something out here ip
  • 00:09:43
    addresses follow a set of standards
  • 00:09:45
    known as
  • 00:09:45
    protocols these protocols are the
  • 00:09:47
    backbone of networking
  • 00:09:49
    and force many devices to communicate in
  • 00:09:51
    the same language
  • 00:09:52
    which is something that we'll come on to
  • 00:09:54
    another time however we should recall
  • 00:09:56
    that devices
  • 00:09:56
    can be on both a private and public
  • 00:09:59
    network depending on where they
  • 00:10:01
    where they are will determine the type
  • 00:10:02
    of ip address they have a public or
  • 00:10:04
    private ip address
  • 00:10:06
    so real quick there was a note in here
  • 00:10:10
    protocols so the reason that we have
  • 00:10:12
    that and the reason that we all use the
  • 00:10:14
    same language
  • 00:10:16
    metaphorically speaking to talk to each
  • 00:10:17
    other over the internet
  • 00:10:19
    is because when the internet first came
  • 00:10:21
    out we had a bunch of different
  • 00:10:22
    protocols and sort of like trying to
  • 00:10:24
    talk
  • 00:10:25
    to a bunch of different people that
  • 00:10:26
    don't speak the same language doesn't
  • 00:10:28
    really work out you can kind of get the
  • 00:10:29
    general gist
  • 00:10:30
    but you know the the communication just
  • 00:10:32
    doesn't happen
  • 00:10:33
    so we established these protocols um and
  • 00:10:35
    they were something that were much more
  • 00:10:37
    uh solidified with the creation of wi-fi
  • 00:10:39
    uh definitely something that if you're
  • 00:10:41
    interested in learning a little bit more
  • 00:10:42
    the wikipedia page has a great summary
  • 00:10:44
    of why this is important
  • 00:10:46
    but generally speaking we have to have
  • 00:10:48
    rules otherwise
  • 00:10:49
    a lot of device manufacturers like
  • 00:10:51
    microsoft and hp ibm you go on name
  • 00:10:53
    whatever one you want
  • 00:10:54
    they'll just make their own and claim
  • 00:10:56
    it's the fastest and the other devices
  • 00:10:58
    won't work with it because they want you
  • 00:10:59
    to buy their device
  • 00:11:00
    so just keep that in mind that is why we
  • 00:11:02
    have protocols
  • 00:11:03
    that force everyone to use the same
  • 00:11:05
    standardized
  • 00:11:06
    communication a public address is used
  • 00:11:09
    to identify the device on the internet
  • 00:11:11
    whereas a private address is used to
  • 00:11:13
    identify a device amongst
  • 00:11:14
    other devices i think of this home
  • 00:11:17
    network
  • 00:11:18
    versus anyone can talk to it on the
  • 00:11:19
    internet generally speaking
  • 00:11:22
    take the table a and screenshot below as
  • 00:11:24
    an example
  • 00:11:25
    here we have two devices on a private
  • 00:11:27
    network and we can see the private
  • 00:11:28
    ranges right here
  • 00:11:30
    there are three private ranges
  • 00:11:32
    predominantly
  • 00:11:33
    uh 192.168 and these last two bits can
  • 00:11:36
    change
  • 00:11:36
    our last two octets rather can change is
  • 00:11:38
    a major one
  • 00:11:39
    uh the 10 zero zero zero
  • 00:11:43
    is another big one and there's another
  • 00:11:45
    one that i can never remember the fall
  • 00:11:46
    of it uh because it has a range
  • 00:11:48
    in the second octet um i recommend
  • 00:11:50
    taking a look at these and we might go
  • 00:11:51
    over them later in the room but just
  • 00:11:52
    know that there are three very distinct
  • 00:11:55
    ranges that the private ip1s can fall
  • 00:11:56
    into and these
  • 00:11:58
    would be public because they don't fall
  • 00:11:59
    into that range and we can see them
  • 00:12:01
    labeled over here on the side
  • 00:12:03
    uh these will be on the same network
  • 00:12:04
    because these are well
  • 00:12:06
    okay in theory they could be on the same
  • 00:12:08
    network they might not necessarily but
  • 00:12:10
    they're very likely to be
  • 00:12:11
    because we have 192 168 1 and then 74
  • 00:12:14
    and then 77.
  • 00:12:16
    these could exist on the same network
  • 00:12:17
    because they don't conflict um and they
  • 00:12:19
    could talk to each other in theory if
  • 00:12:20
    there's not routing rules or other
  • 00:12:22
    restrictions in play uh and here you can
  • 00:12:25
    see
  • 00:12:25
    this would might be a screenshot from a
  • 00:12:28
    router
  • 00:12:28
    that we have these two devices with
  • 00:12:31
    their mac addresses
  • 00:12:32
    don't worry too much about this right
  • 00:12:34
    now just know that this is in theory
  • 00:12:36
    unique
  • 00:12:37
    and these are the private ip addresses
  • 00:12:40
    that
  • 00:12:40
    they have on the network and they were
  • 00:12:43
    assigned via dhcp which just means that
  • 00:12:45
    i have a pool of addresses first come
  • 00:12:47
    first serve and we give them out
  • 00:12:49
    and they're not necessarily like you get
  • 00:12:51
    this one permanently on this network
  • 00:12:53
    that would be a static addressing these
  • 00:12:56
    two devices will be able to use
  • 00:12:57
    their private ip addresses to
  • 00:12:59
    communicate with each other
  • 00:13:00
    however any data sent to the internet
  • 00:13:03
    from either of these
  • 00:13:04
    devices will be identified by the same
  • 00:13:06
    public ip address so your home would
  • 00:13:08
    have a public ip address in this case
  • 00:13:10
    but you'll have your private ip your
  • 00:13:12
    private network sits behind that
  • 00:13:14
    public ip addresses are given by your
  • 00:13:16
    internet service provider or
  • 00:13:18
    isp for short uh at your monthly bill so
  • 00:13:22
    when you buy when you have an internet
  • 00:13:24
    service contract set up
  • 00:13:25
    you'll have a nip address that is
  • 00:13:27
    associated with your home
  • 00:13:28
    uh sometimes this can be associated with
  • 00:13:30
    a couple different homes
  • 00:13:32
    this can get a little weird you can pay
  • 00:13:35
    to have this not change and be static
  • 00:13:37
    but just know that this is something
  • 00:13:39
    that exists on the public internet in
  • 00:13:41
    this case
  • 00:13:43
    as more and more devices become
  • 00:13:45
    connected it is becoming increasingly
  • 00:13:47
    harder to get
  • 00:13:48
    a public address that isn't already in
  • 00:13:50
    use uh for example
  • 00:13:51
    cisco an industry giant in the world of
  • 00:13:53
    networking estimated that there will be
  • 00:13:55
    approximately 50 billion devices
  • 00:13:57
    connected on the internet by the end of
  • 00:13:59
    the
  • 00:13:59
    uh 2021. so the current year in the time
  • 00:14:02
    of this recording
  • 00:14:03
    enter ip address uh or address versions
  • 00:14:07
    so far we've only discussed one version
  • 00:14:09
    of the internet protocol
  • 00:14:10
    addressing scheme known as ipv4 ipv4 is
  • 00:14:14
    pretty old it had some limitations that
  • 00:14:17
    we didn't really anticipate
  • 00:14:18
    this many devices to be connected to the
  • 00:14:19
    internet uh but we have smart homes and
  • 00:14:22
    other things like that which
  • 00:14:23
    dramatically increases uh the number of
  • 00:14:26
    devices that we're connecting to the
  • 00:14:28
    internet on the whole
  • 00:14:29
    especially if they need public addresses
  • 00:14:32
    and this uses a numbering system
  • 00:14:33
    uh of two raised to the 32nd ip
  • 00:14:36
    addresses so
  • 00:14:37
    4.92 or 29 billion
  • 00:14:40
    so you can see where there's a shortage
  • 00:14:41
    because we have more devices that are
  • 00:14:43
    connected to the public internet
  • 00:14:46
    than we have available for ipv4
  • 00:14:49
    addresses
  • 00:14:50
    ipv6 is a relatively new iteration
  • 00:14:53
    of the internet protocol addressing
  • 00:14:55
    scheme to help tackle this
  • 00:14:57
    issue although it is seemingly more
  • 00:14:59
    daunting it boasts a few benefits
  • 00:15:02
    so it supports up to two to the 128th
  • 00:15:05
    power of ip addresses so this is 340
  • 00:15:08
    trillion plus
  • 00:15:09
    uh in theory we should ever run out of
  • 00:15:11
    these we'll see what happens
  • 00:15:13
    uh just because more devices are being
  • 00:15:15
    connected um and it resolves that big
  • 00:15:17
    issue with ipv4 because we were going to
  • 00:15:19
    run out
  • 00:15:20
    now we really can't more efficient due
  • 00:15:22
    to more or new methodologies so there's
  • 00:15:24
    a bunch of new technologies that were
  • 00:15:26
    introduced in this
  • 00:15:26
    don't worry too much about knowing this
  • 00:15:29
    just know that in general ipv6 has a
  • 00:15:31
    bunch of
  • 00:15:31
    cool new shiny features and you can see
  • 00:15:34
    there's a comparison of those two
  • 00:15:36
    addresses so
  • 00:15:36
    with an ipv4 we had these four octets
  • 00:15:40
    and this is a lot longer i won't go too
  • 00:15:42
    much in the detail just
  • 00:15:43
    know that ipv6 exists this is not as
  • 00:15:46
    common to see
  • 00:15:47
    on home networks generally speaking you
  • 00:15:50
    need to know about this just that it
  • 00:15:51
    exists
  • 00:15:52
    and once you get further into
  • 00:15:53
    penetration testing or defense
  • 00:15:55
    knowing that ipv6 is another way that
  • 00:15:58
    things can talk to each other
  • 00:15:59
    that's just another thing to be aware of
  • 00:16:01
    so that's all you need to know
  • 00:16:03
    at this point in time just focus on ipv6
  • 00:16:06
    and this is going to be where most
  • 00:16:08
    everybody focuses nowaday
  • 00:16:10
    anyhow let's go ahead and talk about mac
  • 00:16:12
    addresses
  • 00:16:14
    devices on a network will all have a
  • 00:16:16
    physical network interface
  • 00:16:18
    which is a micro trip board found on the
  • 00:16:19
    device's motherboard this is your
  • 00:16:21
    ethernet port
  • 00:16:22
    or your wi-fi card whatever this is this
  • 00:16:25
    network interface is assigned a unique
  • 00:16:27
    address at the factory it was built at
  • 00:16:29
    called a mac address a media access
  • 00:16:32
    control address
  • 00:16:33
    this is referred to as burnt in uh in
  • 00:16:35
    quotation marks
  • 00:16:36
    uh this is because in theory can't be
  • 00:16:38
    changed you can do spoofing and other
  • 00:16:40
    things with this
  • 00:16:41
    don't worry about that too much right
  • 00:16:42
    now just know again this is in theory
  • 00:16:45
    globally unique and the odds that you're
  • 00:16:47
    gonna have two devices on the same
  • 00:16:49
    network that have the same mac
  • 00:16:51
    very very very very infinitesimally
  • 00:16:54
    small chance
  • 00:16:55
    big businesses can run into this every
  • 00:16:56
    once in a while but it's pretty rare
  • 00:16:59
    the mac address is a 16 character
  • 00:17:01
    hexadecimal
  • 00:17:02
    number a base 16 numbering system used
  • 00:17:05
    in computing
  • 00:17:06
    to represent numbers you can see that
  • 00:17:08
    this is hex
  • 00:17:09
    b16 where it rolls over from nine
  • 00:17:12
    and it starts a b c d e and then
  • 00:17:15
    f is the last one and you can see that
  • 00:17:18
    this is an example
  • 00:17:19
    of a mac address here where it is six
  • 00:17:22
    groups of two of these the first six
  • 00:17:25
    characters represent the company that
  • 00:17:26
    made it so right here
  • 00:17:28
    that made the networking interface and
  • 00:17:29
    the last six is in theory a unique
  • 00:17:32
    number
  • 00:17:33
    so and you can see that broken apart
  • 00:17:35
    down here
  • 00:17:36
    however an interesting thing with mac
  • 00:17:39
    addresses is that they can be faked or
  • 00:17:41
    spoofed as i mentioned before
  • 00:17:43
    this spoofing occurs when a network
  • 00:17:44
    device pretends to identify
  • 00:17:46
    as another by using its mac address when
  • 00:17:49
    this happens it can often break
  • 00:17:51
    poorly implemented security designs that
  • 00:17:53
    assume devices
  • 00:17:54
    talking on a network are trustworthy
  • 00:17:56
    because they're not
  • 00:17:57
    don't worry too much about this this is
  • 00:17:59
    more of a situation of just know about
  • 00:18:01
    this
  • 00:18:01
    it's not something too major and you'll
  • 00:18:04
    come across it
  • 00:18:05
    later on in your security career take
  • 00:18:08
    the following example
  • 00:18:09
    a firewall is configured to allow any
  • 00:18:11
    communication going to
  • 00:18:12
    and from the mac address of the
  • 00:18:14
    administrator if the device were to
  • 00:18:16
    pretend or
  • 00:18:17
    spoof this mac address this firewall
  • 00:18:19
    would
  • 00:18:20
    now think that it is receiving
  • 00:18:22
    communication from the administrator
  • 00:18:23
    when it is not so places such as cafes
  • 00:18:27
    coffee shops and hotels alike often use
  • 00:18:29
    mac address control
  • 00:18:31
    when using their guest or public wi-fi
  • 00:18:34
    this configuration could offer better
  • 00:18:35
    services
  • 00:18:36
    i.e a faster connection for a price if
  • 00:18:38
    you're willing to pay
  • 00:18:39
    the fee per device uh the interactive
  • 00:18:42
    lab attached to this task has been made
  • 00:18:43
    to replicate this scenario
  • 00:18:45
    and let's go ahead and spin that up
  • 00:18:46
    right now so in theory you could just
  • 00:18:48
    pretend to be someone else
  • 00:18:49
    that is something that happens let's go
  • 00:18:52
    ahead and scroll back down
  • 00:18:54
    to the practical bit
  • 00:18:57
    the interactive labs simulate a hotel
  • 00:19:00
    wi-fi network
  • 00:19:00
    we have to pay for the service you'll
  • 00:19:03
    notice that the router is not allowing
  • 00:19:05
    bob's traffic bob being right down here
  • 00:19:07
    but alice's package green right here are
  • 00:19:09
    going through
  • 00:19:10
    just fine because she paid for the wi-fi
  • 00:19:12
    try changing bob's mac address to the
  • 00:19:14
    same as alice's and see what happens
  • 00:19:17
    and let's see i think i need to scroll
  • 00:19:18
    down and
  • 00:19:22
    let's try changing these to be
  • 00:19:25
    the same if i can type this all out
  • 00:19:29
    let's see if i can just highlight this
  • 00:19:31
    copy
  • 00:19:33
    oh i can and there we go and now
  • 00:19:35
    suddenly we can talk out to the internet
  • 00:19:37
    and we got a flag uh don't worry too
  • 00:19:39
    much if you can't read that i'm going to
  • 00:19:40
    go ahead and paste that here
  • 00:19:44
    so thm you got on try hack me so in
  • 00:19:47
    theory you could spoof your back address
  • 00:19:48
    if you haven't paid for wi-fi like this
  • 00:19:51
    just something to know about
  • 00:19:53
    again just know the idea that mac
  • 00:19:55
    address control exists
  • 00:19:56
    and that mac addresses are in theory
  • 00:19:58
    globally unique that's really all you
  • 00:20:00
    need to get from this
  • 00:20:01
    let's go ahead and go into the other
  • 00:20:02
    questions what does the term
  • 00:20:05
    ip stand for that is going to be
  • 00:20:07
    internet
  • 00:20:08
    protocol what is
  • 00:20:11
    each section of an ip address called
  • 00:20:13
    that is going to be an octet
  • 00:20:16
    how many sections in digits does an ip
  • 00:20:18
    address have
  • 00:20:19
    that will be four and let's see what
  • 00:20:22
    does the term
  • 00:20:23
    mac stand for media
  • 00:20:26
    address control i believe
  • 00:20:30
    uh it should be access control i'm
  • 00:20:32
    guessing
  • 00:20:35
    there we go perfect let's go to move
  • 00:20:37
    into task
  • 00:20:38
    4 ping with icmp let's go and pull this
  • 00:20:41
    up so we don't have to watch back it's
  • 00:20:42
    fly across
  • 00:20:45
    ping is one of the most fundamental
  • 00:20:47
    network tools available to us
  • 00:20:49
    ping uses icmp internet control message
  • 00:20:52
    protocol
  • 00:20:52
    packets to determine the performance of
  • 00:20:55
    a connection between devices
  • 00:20:57
    for example if the connection exists or
  • 00:20:59
    is reliable so
  • 00:21:01
    this is a way that we can determine
  • 00:21:03
    performance
  • 00:21:04
    the time taken for icmp packets
  • 00:21:06
    traveling between devices
  • 00:21:07
    is measured by ping as such as in the
  • 00:21:10
    screenshot below we can see the output
  • 00:21:12
    of a ping command here
  • 00:21:13
    this measuring is done using icmp's echo
  • 00:21:16
    packet
  • 00:21:17
    and then icmp is echo reply from the
  • 00:21:19
    target device and you can see
  • 00:21:21
    that we have a ping command with our
  • 00:21:22
    target up here and then we have our time
  • 00:21:25
    here
  • 00:21:25
    and then it looks like we have our
  • 00:21:27
    average back here
  • 00:21:29
    so the average performance or how much
  • 00:21:31
    time it takes us to talk to another
  • 00:21:32
    device
  • 00:21:34
    pings can be performed against devices
  • 00:21:35
    on a network such as your home network
  • 00:21:37
    or research
  • 00:21:38
    resources such as websites this tool can
  • 00:21:41
    be
  • 00:21:42
    easily used incomes installed on
  • 00:21:43
    operating systems os's
  • 00:21:45
    such as linux and windows the syntax to
  • 00:21:48
    do
  • 00:21:48
    a simple ping is ping and then the ip
  • 00:21:51
    address right here
  • 00:21:52
    or your website url so ping is the
  • 00:21:53
    command and then either the website url
  • 00:21:56
    or the ip address and you can see that
  • 00:21:57
    demonstrated down here
  • 00:21:59
    here we are pinging a device that has
  • 00:22:01
    the private address of 192.168.1.254
  • 00:22:06
    ping informs us that we have sent six
  • 00:22:09
    icmp packets
  • 00:22:10
    all of which were received with an
  • 00:22:12
    average time of 5.3 seconds
  • 00:22:15
    now that now you are going to do the
  • 00:22:17
    same thing to paying the ip address
  • 00:22:19
    of 888 this is one of google's dns
  • 00:22:22
    servers
  • 00:22:23
    on the deployable website in this task
  • 00:22:25
    paying the correct address will reveal
  • 00:22:27
    a flag and answer the following
  • 00:22:30
    questions
  • 00:22:31
    let's see so let's go ahead and dive
  • 00:22:33
    into the questions what protocol does
  • 00:22:35
    ping use
  • 00:22:36
    icmp if i can type
  • 00:22:39
    what is the syntax you paying all tens
  • 00:22:43
    that will be 10 or ping 10 10
  • 00:22:46
    10 10 and what flag do you get when you
  • 00:22:48
    ping
  • 00:22:49
    quad eights uh let's see
  • 00:22:52
    i guess we just put it up here and then
  • 00:22:56
    we'll go and send our ping requests
  • 00:22:58
    and we have just a moment to finish its
  • 00:23:01
    ping
  • 00:23:02
    and then we have our flag i pinged the
  • 00:23:04
    server let's go and copy that
  • 00:23:06
    and we'll paste it in and let's move
  • 00:23:08
    into task five
  • 00:23:10
    continue your learning intro to lan
  • 00:23:12
    continue your learning by joining the
  • 00:23:14
    intro to land room
  • 00:23:16
    we'll go and mark that as complete and
  • 00:23:17
    otherwise i will see you in the video
  • 00:23:19
    for that room
  • 00:23:20
    uh but until then as always i have the
  • 00:23:22
    try hack me discord
  • 00:23:24
    as well as the separate linked in the
  • 00:23:26
    video description below if you have any
  • 00:23:27
    questions feel free to hop in there
  • 00:23:29
    but until next time happy hacking
タグ
  • networking
  • internet
  • IP address
  • MAC address
  • private network
  • public network
  • protocols
  • ICMP
  • ping
  • cybersecurity