当前位置:网站首页>Hack the box - Introduction to networking module detailed Chinese tutorial
Hack the box - Introduction to networking module detailed Chinese tutorial
2022-07-26 05:25:00 【renu08】
Catalog
Network structure ................................................................................................................... 2
1.1 The type of network ................................................................................................... 2
1.2 Basic types of network topology ..................................................................................... 2
1.3 Basic classification of agents ................................................................................................ 5
1.4 Network model classification ................................................................................................ 5
network address ................................................................................................................... 5
2.1IPV4 Address ....................................................................................................... 5
2.2MAC Address ....................................................................................................... 7
2.4 IPV6 Address .................................................................................................... 7
Some basic knowledge about network , Learn and understand some network protocols , Network transmission , Network topology , And other related network knowledge
Network structure
1.1 The type of network
Wide area network (WAN): The traditional Internet
LAN (LAN): Internal network , For example, office network , Home networking
WLAN (WLAN): adopt WIFI Connected LAN
Virtual professional network (VPN): Connect multiple networks to a LAN
1.2 Basic types of network topology



1.3 Basic classification of agents
Forward agency : Users send packets through the browser , Through the proxy server , Send data to... Through proxy server web The server
Reverse proxy : Filtering user input , for example web Firewall is a kind of reverse proxy
1.4 Network model classification
OSI Model: Used to describe and define the communication between systems , altogether 7 layer , Each layer has specific functions
TCP/IP: General network protocol , The most basic protocol of the Internet , Network data transmission, etc
Tip: relative TCP/IP Agreement for ,OSI Model Relatively outdated , There are many limitations , During transmission , Will encapsulate a head Header into packet ,head Save some information such as the identity of this packet
network address
2.1IPV4 Address
IPV4 Address by 32 Bit binary number means , Connect by points ,IP The address is divided into network part( Network part ),host part( The host part of the ), Divided by subnet mask( Subnet mask to determine the location of the partition )
Broadcast( Broadcast address ): the last one IPV4 The address of is the broadcast address
CIDR: IP Mixed form of address and subnet mask , for example :127.0.0.1/24 /24 Represents the subnet mask of binary representation 1 Number of digits , The subnet mask can be calculated
Subnet: subnet , Yes, it will IP The address range is divided into smaller addresses , This allows you to allocate addresses to hosts under this network segment
Subnet Structure :
Network address
Broadcast address
First host
Last host
Number of hosts
Subnet The distribution of : We know one IP Address of the network part and host part The division of parts is based on subnet mask To divide , Examples are as follows , To illustrate a IP The process of address subnet division
example : Suppose a IP Address ,192.168.12.160/26 Now it needs to be divided into 4 Subnet , What is the result after division ?
First step : Divide first network part and host part According to the subnet mask , as follows
According to the given ip The subnet mask of the address can be calculated as :255.255.255.192
The binary representation is as follows :
IPv4 1100 0000 1010 1000 0000 1100 1010 0000 192.168.12.160/26
Subnet mask 1111 1111 1111 1111 1111 1111 1100 0000 255.255.255.192
According to the subnet mask division ,host part by :10 0000
Subnet network address Is to put host part Set all 0 , Available 192.168.12.128/26
Subnet boracast address Is to put host part Set all 1, Available 192.168.12.191
Then we can calculate the allocable IP Address of the HOST The number of 192-128+1 = 64
The distribution of IPV4 The range of addresses is 192.168.12.129-192.168.12.190( Because the above two addresses have been assigned )
The second step : Divide subnets , as follows
Because we need to divide 4 Subnet ,4 be equal to 2^2, So we need to /26+2 = /28
Tip:2^n= Number of subnets divided
The binary representation is as follows :
IPv4 1100 0000 1010 1000 0000 1100 1000 0000 192.168.12.128/28
Subnet mask 1111 1111 1111 1111 1111 1111 1111 0000 255.255.255.240
We calculated the current allocable HOST The total number is 64 , Now it is divided into 4 Subnet , We
You can calculate how many subnets there are HOST,64/4=16
The final results are as follows :
Subnet No. | Network Address | First Host | Last Host | Broadcast Address | CIDR |
1 |
|
|
|
|
|
2 |
|
|
|
|
|
3 |
|
|
|
|
|
4 |
|
|
|
|
|
2.2MAC Address
MAC Address : It is from 48 Bit binary number composition ,MAC The address is physically connected , for example , bluetooth , Wireless network, etc , Altogether 6 position 16 A decimal number means , as follows :
E:AD:BE:EF:13:37
DE-AD-BE-EF-13-37
DEAD.BEEF.1337
2.4 IPV6 Address
IPV6 Address : By 128 Bit binary number means , With 16 In hexadecimal form , as follows :
Long :fe80:0000:0000:0000:dd80:b1a9:6687:2d3b/64
short :fe80::dd80:b1a9:6687:2d3b/64
边栏推荐
- 虚拟偶像代言产品出问题谁负责? 且听律师分析
- Thread三种实现方式 和 Handler的用法
- 嵌入式通用学习路线整理
- TZC 1283: simple sort - select sort
- LNMP架构
- C语言-指针进阶
- Okaleido launched the fusion mining mode, which is the only way for Oka to verify the current output
- Okaleido launched the fusion mining mode, which is the only way for Oka to verify the current output
- C language force buckle question 42 of rain. Four methods - violence, dynamic planning, stack, double pointer
- Princeton calculus reader 02 Chapter 1 -- composition of functions, odd and even functions, function images
猜你喜欢

没背景、没学历?专科测试员进入互联网大厂是不是真的没希望?

Lesson 2 getting to know slam for the first time

Data warehouse construction -dim floor

Yolov3 preparatory work

推荐必读:测试人员如何快速熟悉新业务?

Development to testing: a six-year road to automation from scratch

Getaverse,走向Web3的远方桥梁

87. Disturb string

Compilation method of flood control evaluation report and flood modeling under the new guidelines

C language - Advanced pointer
随机推荐
Getaverse, a distant bridge to Web3
Go exceed API source code reading (VI) -- deletesheet (sheet string)
Leetcode linked list problem - 206. reverse linked list (learn linked list by one question and one article)
C语言函数
YOLOV3预备工作
攻防世界-FlatScience
OD-Paper【2】:Fast R-CNN
nn.Moudle模块-创建神经网络结构需要注意的细节
STL常用模板库
Basic methods of realizing licensing function in C language
数仓搭建-DIM层
FTP实验及概述
Recommend 12 academic websites for free literature search, and suggest to like and collect!
Unity scene jump script
How to handle aggregate collection code
真正的科学减肥
Hack The Box - Web Requests Module详细讲解中文教程
Attack and defense world flatscience
SAP report development steps
家居vr全景展示制作提高客户转化