Internet & More Flashcards

1
Q

MAC

A

Media Access Control address
48-bit number written in hexadecimal, with bytes separated by colons (08:00:27:3b:8f:ed)
Always remains the same for a device!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIC

A

Network Interface Card

- In PCs and Laptops, to connect to WiFi routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ipv4

A

32 bit number, 4 8-bit numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIDR

A

Classless inter-domain routing
128.143.1.1/16 -> means machines share the same upper 16 bits
E.g. All addresses are in form: 128.143.xxx.xxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DSLAM

A

Digital Subscriber Line Access Multiplexer
- Allows internet signals to be sent over cable TV wires
( why you can connect both TV and router to same cable socket)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Path of Web Requests

A

Web request -> laptop NIC -> Wifi router -> DSLAM -> ISP routers -> … Router -> Machine by MAC Address
(Once the packet is at the lowest level of the hierarchy (no more routers), the final router uses the MAC address to determine final destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LAN

A

Local Area Network - lowest level because all machines there are connected through a single router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP

A

Address Resolution Protocol

  • Router needs to know the MAC address of a machine with a given local IP address
  • Stores map of IP -> MAC addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lowest IP Address on a LAN

A

Normally the router!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAM

A

Content Addressable Memory

  • Memory hardware used in routers and switches
  • Map MAC addresses to corresponding ports
  • If CAM is full, will broadcast message on all ports
  • This is an attack vector, by sending packets w/ random MAC addresses to the switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ports

A

On a network, a port is a communication endpoint

  • At the software level, within an operating system, a port is a logical construct that identifies a specific process
  • Allow a process to communicate over a network
  • Allows multiple processes to communicate with network at same time
  • 16 bit number (1 - 2**16-1) (65535 ports)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open port

A

A port that accepts a connection from an external process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

5 Layer Internet Protocol Model

Kurose, Forouzan

A
Application Layer
Transport Layer (TCP/UDP)
Network Layer (IP)
Data Link Layer (MAC)
Physical Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Model

A
(7 layers)
Application
Presentation
Session
Transport
Network
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

P2P

A

Peer-to-Peer

Clients exchange information directly with each other (as opposed to client-server model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Client-server model

A

Client initiates communication with a waiting server, which responds

17
Q

SSH

A

Secure Shell

18
Q

NAT

A

Network Address Translation

19
Q

Why do we use “models” of the internet stack?

A

So we can model each layer in terms of encapsulation ->

  • Each layer is independent, managing the communications within that layer only
  • Each layer doesn’t care about other layer actions
20
Q

Application Layer (5 layer model)

A

Layer 5 - Communicate between applications

  • Protocols
    • HTTP
    • FTP
    • BitTorrent
    • SMTP
21
Q

Transport Layer (5 layer model)

A

Layer 4 - Communication of processes over internet

  • TCP (transmission control protocol) - guarantees packet get to destination
  • UDP (user datagram protocol) - no guarantees, simpler
22
Q

Network Layer (5 layer model)

A

Layer 3 - How packets flow between routers
- Implements IP (Internet Protocol)
(traceroute can show this path_
Uses ICMP - Internet Control Message Protocol

23
Q

ICMP

A

Internet Control Message Protocol

24
Q

Data Link Layer (5 layer Model)

A

Layer 2 - communications between NICs (Network Interface Cards)
- Implements MAC protocol

25
Q

Physical Layer (5 layer model)

A

Layer 1

Convert 1-0s into transmittable form (light, radio, electrical, sound)

26
Q

Socket

A

An API that allows programs to communicate over a network

2 main types
- TCP
- UDP
others, including SOCK_RAW, and ICMP

27
Q

DDOS

A

Distributed Denial of Service Attack

- Overwhelm a web server with traffic, causing it to become temporarily unavailable

28
Q

CNC (C2)

A

Command and Control

29
Q

HTTPS port

A

443

30
Q

HTTP Default port

A

80

31
Q

SSH Port

A

22

32
Q

Telnet

A

“Teletype Over Network”

Telnet server listens on port 23

33
Q

Static content

A

Files served “as-is” (HTML docs, CSS, JS, images, video, fonts)

34
Q

Dynamic Content

A

Files update before being served to a client

35
Q

Ransomware

A

Malicious code that “holds a machine hostage” by encrypting its files.
- Generally demand money in exchange for decrypting the files

36
Q

Plaintext

A

Original text/data before encryption is applied

37
Q

Caesar Cipher

A

One of the earliest encryption algorithms

  • Replaces each letter with another a fixed number of positions away in the alphabet (an example of a substitution cipher)
  • ROT13 (replace letters with the letter 13 away) can be used the for both encryption and decryption, providing very little security
38
Q

ASCII

A

American Standard Code for Information Interchange

39
Q

IPC

A

Inter-process Communication