networking Flashcards
dns - how to configure dns so that www.domain.com and domain.com work
set an a record fo (blank) | hostname | IP AND www | hostname | IP
format for a HTTP protocol command
[Command] [Resource] [Protocol Name/Version] e.g. GET / HTTP/1.0
how does IP address spoofing work?
forging the packet header so it contains a different address than the computer sending it. # response goes to spoofer address, so only used when you the spoofer doesn’t care about the response
linux - get tcpdump to ignore port 23
tcpdump not port 23
linux - get tcpdump to log to a particular file
tcpdump -w capture_file
linux - limit the number of packets dumped by tcpdump to 50
tcpdump -c 50
linux - print all packets from mysite.com
tcpdump src host mysite.com
linux - see all the routers used in getting to Google.com
traceroute www.google.com
linux - use tcpdump to only look at HTTP requests
tcpdump dst port 80 # destination port # often you’ll need to specify the device for tcpdump with -i so you might need to add this
linux - what does -n option do tcpdump -n
turns off name resolution # you might want to do this since name resolution slows down interception… sometimes crippling it
linux - what is tcpdump
a packet sniffer # able to capture traffic that passes through a machine
linux - what is the -i option with tcpdump
the network interface tcpdump -i en1
linux – what is the final piece of info with tcpdump 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: P 1366488174:1366488582 (408) ack 2337505545 win 7240
Information about the packet. For instance, here we have TCP sequence numbers, flags, ARP/ICMP commands, etc.
linux – what is the first piece of info with tcpdump 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: Flags [.], ack 537, win 65535, options [nop,nop,TS val 388814076 ecr 999361453], length 0
the time this packet was received
linux – what is the second piece of info with tcpdump 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: Flags [.], ack 537, win 65535, options [nop,nop,TS val 388814076 ecr 999361453], length 0
protocol name (here it’s IP)
linux – what is the third piece of info with tcpdump output 10:15:15.571309 IP anon.63180 > sjc-not9.sjc.dropbox.com.http: Flags [.], ack 537, win 65535, options [nop,nop,TS val 388814076 ecr 999361453], length 0
source and destination IP address # only true of IP protocol normally. try appending -e to get the same info in other protocols
networking - a subnet expressed like so means what 11.22.33.0/24
subnet is 11.22.33 with 24 significant bits (32 bits total (4X8) in an IPv4) (same as 255.255.255.0 subnet mask) # called the significant bit format
networking - a T1 and a backup ISDN are connected to a router. how does the router know to use the ISDN if the T1 is down
configuration table
networking - besides finding the fastest possible route on a second by second basis what is the second advantage of packet switching
redundancy - if one part of the network goes down the info still gets there
networking - difference between how TCP and UDP transport packets
After UDP has placed a packet on the network (via the IP protocol), it forgets about it TCP keeps connection open and keeps sending the packet until it has been received
networking - do all packets follow the same route on the network
not necessarily – each one follows the most efficient one… and this is determined by the hardware on a millisecond by millisecond basis
networking - how are subnets connected to one another?
with routers or gateways, which belong to multiple subnets, forwarding internet traffic from one subnet to the other
networking - how do computers in subnets (e.g. in offices) get online
your computer directs all traffic destined to the internet through a gateway in your local subnet. The gateway substitutes its own IP address and port in place of your computer’s. When chunks of data arrive in reply, the gateway knows from the port number in the data that they must be forwarded to your computer and local port.
networking - how do DDOS attacks get around router’s specificity rules which block certain IP addresses
by spoofing the IP of the sender
networking - how do routers know when to reconfigure the path
they tell each other about line conditions, delays in transmission…
networking - how do routers prevent networking clogging
stop information from going where it’s not needed