1. What is a Network?
Launch Ping SimA network is simply two or more computers connected together to share resources. In cybersecurity, the network is the battlefield. It is the road that data travels on.
# Sending data packets to Google to see if the network is alive
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=115 time=14.2 ms
Security Relevance
Hackers start every engagement by "mapping the network." They use tools like nmap to find every connected device.
2. LAN vs WAN
Launch LAN VisualizerNetworks are classified by their physical scope. Understanding this distinction is vital for understanding "pivoting" attacks.
๐ก๏ธ Attack Vector: Pivoting
LAN attacks usually involve "Pivoting". Once you hack one weak device (like a printer), you are "inside" the LAN.
๐งช Mini Exercise
Open your terminal (or CMD on Windows) and type: ipconfig (Win) or ip a (Linux).
Look for your "IPv4 Address". Does it start with 192.168... or 10...? If so, you are on a LAN.
3. Bandwidth, Latency, Throughput
Launch Speed SimConfusing these terms is a rookie mistake. Imagine a highway:
- Bandwidth: The number of lanes on the highway. (Max theoretical capacity).
- Throughput: The actual number of cars moving right now. (Real-world speed).
- Latency (Ping): The time it takes for one car to drive to the destination and come back.
Red Flag: High Latency
Sudden high latency or low throughput can indicate that your traffic is being intercepted, proxied, or routed through a malicious node (Man-in-the-Middle attack).
4. MAC vs IP Address
Launch Packet ViewerEvery device needs an ID card. In networking, you have two.
MAC Address (Physical)
Burnt into the hardware. Looks like: 00:1A:2B:3C:4D:5E. Used for local communication inside the LAN.
IP Address (Logical)
Assigned by the network router. Looks like: 192.168.1.5. Used to find devices across the internet.
๐ MAC Spoofing
Hackers change their MAC address to bypass "MAC Filtering" on Wi-Fi or to impersonate trusted devices. In Linux, this is as easy as typing: macchanger -r eth0.
5. Public vs Private IP
Launch NAT SimNot all IP addresses can go on the internet. Because we ran out of IPv4 addresses, we use private ranges internally.
192.168.x.x (Home networks)
10.x.x.x (Enterprise networks)
172.16.x.x (Universities/Labs)
6. DNS (Domain Name System)
Launch DNS SIMULATIONComputers speak in numbers (IPs), humans speak in names (google.com). DNS is the phonebook that translates them.
โ ๏ธ Attack Vector: DNS Poisoning
If a hacker can corrupt the DNS cache, they can make facebook.com point to their own malicious IP address.
๐งช Mini Exercise
Open your terminal and type: nslookup google.com.
The "Address" shown is the real IP address of Google's server. You just performed a DNS query manually.
๐ Module Recap
- LAN is your trusted local zone; WAN is the untrusted internet.
- MAC Addresses are for local ID; IP Addresses are for global travel.
- Private IPs (192.168.x.x) stay inside; Public IPs go outside.
- DNS translates names to IPs. It is a frequent target for spoofing.