Sophie Chen
ResumeLinkedInGitHubBluesky
Work
Work
  • Work
  • Digital Forensics Lab
    • 1 Setting Up
    • 2 Basic Computer Skills for Digital Forensics
      • 2.1 Number Systems
      • 2.2 PC Introduction
      • 2.3 Windows Command Line Tutorial
      • 2.4 Linux Command Line Tutorial
      • 2.5 Advanced Linux Command Line Tutorial
    • 3 Basic Networking Skills for Digital Forensics
      • 3.1 HTTP Analysis using Wireshark 1
      • 3.2 HTTP Analysis using Wireshark 2
      • 3.3 SYN Flood Attack Investigation using tshark
      • 3.4 SMTP Forensics
      • 3.5 ARP Poisoning Forensics
      • 3.6 Firewall
      • 3.7 DNS Introduction
      • 3.8 DNS Spoofing Forensics
      • 3.9 WEP40 Wireless Aircrack
    • 4 Computer and Digital Forensics
      • 4.1 Introduction to Digital Forensics
      • 4.2 Sleuth Kit Tutorial
      • 4.3 USB Image Acquisition
      • 4.4 Evidence Search - A Pattern Match Game
      • 4.5 Evidence Search - File Metadata
      • 4.6 Data Carving
      • 4.7 Steganography
      • 4.8 Forensic Report Template
    • 5 Computer Forensics Case Studies
      • 5.1 Investigating NIST Data Leakage
        • 5.1.1 Environment Setting Up
        • 5.1.2 Windows Registry
        • 5.1.3 Windows Event and XML
        • 5.1.4 Web History and SQL
        • 5.1.5 Email Investigation
        • 5.1.6 File Change History and USN Journal
        • 5.1.7 Network Evidence and shellbag
        • 5.1.8 Network Drive and Cloud
        • 5.1.9 Master File Table ($MFT) and Log File ($logFile) Analysis
        • 5.1.10 Windows Search History
        • 5.1.11 Windows Volume Shadow Copy Analysis/SQL database carving
        • 5.1.12 Recycle Bin and Anti-Forensics
        • 5.1.13 Data Carving
        • 5.1.14 Crack Windows Passwords
      • 5.2 Investigating P2P Data Leakage
        • 5.2.1 Lab Environment Setting Up
        • 5.2.2 Disk Image and Partitions
        • 5.2.3 Windows Registry and File Directory
        • 5.2.4 MFT Timeline
        • 5.2.5 USN Journal Timeline
        • 5.2.6 uTorrent Log File
        • 5.2.7 File Signature
        • 5.2.8 Emails
        • 5.2.9 Web History
        • 5.2.10 Website Analysis
        • 5.2.11 Timeline (Summary)
      • 5.3 Investigating Illegal Possession of Images
        • 5.3.1 Review HTTP Analysis using Wireshark (text)
        • 5.3.2 Rhion Possession Investigation 1: File recovering
        • 5.3.3 Rhion Possession Investigation 2: Steganography
        • 5.3.4 Rhion Possession Investigation 3: Extract Evidence from FTP Traffic
        • 5.3.5 Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic
      • 5.4 Investigating Email Harassment
        • 5.4.1 Investigating Harassment Email using Wireshark
        • 5.4.2 t-shark Forensic Introduction
        • 5.4.3 Investigating Harassment Email using t-shark
      • 5.5 Investigating Illegal File Transferring
      • 5.6 Investigating Hacking Case
      • 5.7 Investigating Morris Worm Attack
        • 5.7.1 Morris Worm Attack
        • 5.7.2 Investigating Morris Worm Attack
    • 6 Mobile/IoT Forensics Case Studies
      • 6.1 Investigating Echo Show 8
        • 6.1.1 Echo Show Introduction
        • 6.1.2 Echo Show Evidence Planting
        • 6.1.3 Device Teardown and eMMC Chip-off
        • 6.1.4 Image Acquisition and Mounting
        • 6.1.5 Specifications: Device and OS Info
        • 6.1.6 Specifications: User Info
        • 6.1.7 Specifications: Network Connectivity Info
        • 6.1.8 Web Activity
        • 6.1.9 Phone Communication
        • 6.1.10 Multimedia: Photos and related Data
        • 6.1.11 Multimedia: Videos and related Data
        • 6.1.12 Multimedia: Audio and related Data
      • 6.2 Investigating Android 10
        • 6.2.1 Intro Pixel 3
        • 6.2.2 Pixel 3 Image
        • 6.2.3 Pixel 3 Device
        • 6.2.4 Pixel 3 System Setting
        • 6.2.5 Overview: App Life Cycle
        • 6.2.6 AOSP App Investigations: Messaging
        • 6.2.7 AOSP App Investigations: Contacts
        • 6.2.8 AOSP App Investigations: Calendar
        • 6.2.9 GMS App Investigations: Messaging
        • 6.2.10 GMS App Investigations: Dialer
        • 6.2.11 GMS App Investigations: Maps
        • 6.2.12 GMS App Investigations: Photos
        • 6.2.13 Third-Party App Investigations: Kik
        • 6.2.14 Third-Party App Investigations: textnow
        • 6.2.15 Third-Party App Investigations: whatapp
        • 6.2.16 Pixel 3 Rooting
      • 6.3 Investigating iPhone iOS 13.4.1
        • 6.3.1 Intro Intro iPhone iOS 13
        • 6.3.2 iOS 13.4.1 Image
        • 6.3.3 iPhone Device Investigation
        • 6.3.4 iOS System Settings
        • 6.3.5 Overview of App Life Cycle
        • 6.3.6 Messages Investigations
        • 6.3.7 Contacts Investigations
        • 6.3.8 Calendar Investigations
        • 6.3.9 Safari Investigations
        • 6.3.10 Photo Investigations
        • 6.3.11 KnowledgeC Investigations
        • 6.3.12 Health Investigations
        • 6.3.13 Location Investigations
        • 6.3.14 Cellebrite Investigations
        • 6.3.15 Magnet Axiom Investigations
        • 6.3.16 Jailbreak Investigations
      • 6.4 Investigating Drone DJI
        • 6.4.1 DJI Mavic Air Mobile
        • 6.4.2 DJI Mavic Air MicroSD Raw
        • 6.4.3 DJI Mavic Air MicroSD Encase Format
  • CTF Walkthroughs
    • Hack The Box
      • Linux Fundamentals
      • Windows Fundamentals
    • TryHackMe
      • Linux Fundamentals Part 1
      • Linux Fundamentals Part 2
      • Linux Fundamentals Part 3
      • Introductory Networking
      • HTTP in Detail
      • DNS in Detail
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • MAL: Malware Introductory
      • Intro to Digital Forensics
      • Digital Forensics Case B4DM755
  • Multithreaded Network File Server
  • Thread Library
  • Virtual Memory Pager
Powered by GitBook
On this page
  • Task 1: Introduction
  • Task 2: The OSI Model: An Overview
  • Task 3: Encapsulation
  • Task 4: The TCP/IP Model
  • Task 5: Ping
  • Task 6: Traceroute
  • Task 7: WHOIS
  • Task 8: Dig
  • Task 9: Further Reading
  1. CTF Walkthroughs
  2. TryHackMe

Introductory Networking


Task 1: Introduction

This room provides an overview of key networking concepts. This room will teach us:

  • The OSI Model

  • The TCP/IP Model

  • How these models look in practice

  • Basic networking tools

Task 2: The OSI Model: An Overview

The Open Systems Interconnection (OSI) Model is a standard model used in computer networking theory that breaks down computer networks into 7 layers. In practice, networking is more compact.

  1. Physical: This layer is responsible for converting binary data into physical signals, transporting these signals, receiving them, and converting them back into binary data.

  2. Data Link: This layer is responsible for adding a physical identifier, called the Media Access Control (MAC) address, of the receiving endpoint and presenting the data in a format suitable for transmission.

    • When receiving data, this layer also checks for errors.

  3. Network: This layer is responsible for locating the destination of a request using the IP address.

  4. Transport: This layer is responsible for selecting a protocol for transmission and dividing up the data into bite-sized pieces.

    • Transmission Control Protocol (TCP) is a common protocol that is connection-based and values accuracy over speed.

    • User Datagram Protocol (UDP) is a common protocol that is connectionless and values speed over accuracy.

    • The bite-sized pieces are called segments in TCP and datagrams in UDP.

  5. Session: This layer sets up and maintains a connection, called a session, with the destination computer.

  6. Presentation: This layer translate data into a standardized format that can be understood by the receiving computer and performs encryption, compression, and other data translations.

  7. Application: This layer provides an interface for applications running on a computer to transmit information across a network.

Which layer would choose to send data over TCP or UDP?

4

Layer 4 is the is transport layer.

Which layer checks received information to make sure that it hasn't been corrupted?

2

Layer 2 is the data link layer.

In which layer would data be formatted in preparation for transmission?

2

Layer 2 is the data link layer.

Which layer transmits and receives data?

1

Layer 1 is the physical layer.

Which layer encrypts, compresses, or otherwise transforms the initial data to give it a standardized format?

6

Layer 6 is the presentation layer.

Which layer tracks communications between the host and receiving computers?

5

Layer 5 is the session layer.

Which layer accepts communication requests from applications?

7

Layer 7 is the application layer.

Which layer handles logical addressing?

3

Layer 3 is the network layer.

When sending data over TCP, what would you call the "bite-sized" pieces of data?

Segments

While bite-sized pieces are called datagrams in UDP, these pieces are called segments in TCP.

[Research] Which layer would the FTP protocol communicate with?

7

The File Transfer Protocol (FTP) communicates with the application layer.

Which transport layer protocol would be best suited to transmit a live video?

UDP

UDP is preferred in situations where speed is more important than accuracy.

Task 3: Encapsulation

Suppose a computer wants to send information another. The data starts at layer 7 and works its way down to layer 1, where it is then sent to the other computer. At each layer, more information is added to the data in a process called encapsulation.

The receiving computer then reverses encapsulation in a process called de-encapsulation.

The encapsulation and de-capsulation process allows for a standard format of transmitting data. Encapsulated data is given a different names at different layers. Each step in encapsulation can be referenced below.

Notice how, in addition to a header, layer 2 also adds a trailer. This trailer is used to verify that the data has not been corrupted or tampered with during transmission.

How would you refer to data at layer 2 of the encapsulation process (with the OSI model)?

frames

The data link layer, layer 2, works with frames.

How would you refer to data at layer 4 of the encapsulation process (with the OSI model), if the UDP protocol has been selected?

datagrams

The transport, layer 4, works with datagrams in the UDP protocol and segments in the TCP protocol.

What process would a computer perform on a received message?

de-encapsulation

A computer receiving a message performs de-encapsulation in order to recover the original data.

Which is the only layer of the OSI model to add a trailer during encapsulation?

data link

All layers in the OSI model add a header during encapsulation, but the data link layer also adds a trailer.

Does encapsulation provide an extra layer of security (Aye/Nay)?

aye

The data link layer's trailer mathematically verifies that the data has not been corrupted during transmission. This feature also protects against tampering.

Task 4: The TCP/IP Model

The TCP/IP model for networking reflects how networking occurs in the real-world. This model consists of four layers:

  1. Network interface

  2. Internet

  3. Transport

  4. Application

These four layers cover the same functions as the seven layers of the OSI model. A comparison between these two networking models can be seen below.

TCP/IP takes half of its name from TCP. Task 2 contrasted TCP, a connection-based protocol, with UDP, a connectionless protocol. To form a connection between two computers using TCP, a connection is first formed using a three-way handshake.

  1. The initiating computer sends a request containing synchronize (SYN) information.

  2. The receiving computer responds with the SYN information and an acknowledgement (ACK), collectively referred to as SYN/ACK.

  3. The initiating computer sends the ACK information back to the receiving computer.

After these three steps are completed, a connection between the two computers is established for reliable data transmission.

Which model was introduced first, OSI or TCP/IP?

TCP/IP

The TCP/IP model is older than OSI and serves as a basis for real-world networking.

Which layer of the TCP/IP model covers the functionality of the Transport layer of the OSI model (Full Name)?

transport

The transport layers of the OSI model and TCP/IP model are responsible for the same functionalities.

Which layer of the TCP/IP model covers the functionality of the Session layer of the OSI model (Full Name)?

application

The functionality of the OSI session layer is included in the TCP/IP application layer.

The Network Interface layer of the TCP/IP model covers the functionality of two layers in the OSI model. These layers are Data Link, and?.. (Full Name)?

physical

The TCP/IP network interface layer covers the functionality of both the OSI data link and physical layers.

Which layer of the TCP/IP model handles the functionality of the OSI network layer?

internet

The network and internet layers of the OSI model and TCP/IP model are responsible for the same functionalities.

What kind of protocol is TCP?

connection-based

Unlike UDP, TCP is a connection-based protocol.

What is SYN short for?

synchronise

SYN is short for synchronize and is information sent by a computer initiating a connection to another using TCP.

What is the second step of the three way handshake?

SYN/ACK

After a SYN packet is sent to a server, the server responds with the SYN information and acknowledgement information. These two parts form a SYN/ACK packet.

What is the short name for the "Acknowledgement" segment in the three-way handshake?

ACK

The acknowledgement segment, which is the third part of the three-way handshake, is abbreviated as ACK.

Task 5: Ping

The ping command can be used to test whether a connection to a remote resource is possible. This command can be run with ping <resource>.

What command would you use to ping the bbc.co.uk website?

ping bbc.co.uk

You can ping a website using ping <resource>.

Ping muirlandoracle.co.uk. What is the IPv4 address?

217.160.0.152

Run ping muirlandoracle.co.uk. and look at the response to see the IPv4 address.

What switch lets you change the interval of sent ping requests?

-i

View the manual with man ping to see options for the ping command.

What switch would allow you to restrict requests to IPv4?

-4

View the manual with man ping to see options for the ping command.

What switch would give you a more verbose output?

-v

View the manual with man ping to see options for the ping command.

Task 6: Traceroute

traceroute can be used to map the path a request takes as it heads to the target machine. On Linux, the command is run as traceroute <destination>. The Windows equivalent to traceroute is tracert. Linux uses UDP by default, while Windows uses Internet Control Message Protocol (ICMP).

What switch would you use to specify an interface when using Traceroute?

-i

View the manual with man traceroute to see options for the traceroute command.

What switch would you use if you wanted to use TCP SYN requests when tracing the route?

-T

View the manual with man traceroute to see options for the traceroute command.

[Lateral Thinking] Which layer of the TCP/IP model will traceroute run on by default (Windows)?

Internet

traceroute runs on ICMP by default on Windows. ICMP

Task 7: WHOIS

whois allows us to query who a domain name is registered to. In Europe personal details are redacted; however, elsewhere a great deal of information may be available. The tool can be installed with sudo apt-get install whois and run with whois <domain>.

What is the registrant postal code for facebook.com?

94025

Run whois facebook.com and look for the registrant postal code.

When was the facebook.com domain first registered (Format: DD/MM/YYYY)?

29/03/1997

Run whois facebook.com and look for the registration date.

Which city is the registrant based in?

Redmond

Run whois facebook.com and look for the city of the registrant.

[OSINT] What is the name of the golf course that is near the registrant address for microsoft.com?

Bellevue Golf Course

Use Google Maps to search for golf courses near the listed registrant address.

What is the registered Tech Email for microsoft.com?

msnhst@microsoft.com

Run whois microsoft.com and look for the registered tech email.

Task 8: Dig

The Domain Name System (DNS) protocol translates between IP addresses, which identify computers on the Internet using strings of numbers like 10.10.10.10, and domain names, which identify computers on the Internet using strings of letters like tryhackme.com.

Here is the process for translating a domain name to an IP address. If the computer finds an IP address and domain match, then the translation process is complete.

  1. When a domain is requested, the computer first checks its hosts file to see if an IP address has been explicitly mapped to a domain.

  2. Next, the computer checks its local DNS cache to see if it has stored an IP address for the request domain.

  3. The computer then sends a request to a recursive DNS server, which is usually provided by an Internet Service Provider (ISP).

    • A recursive DNS server checks its cache and then directs the computer to the proper place to find the associated IP address for the requested domain.

  4. The computer queries root name servers, then Top-Level Domain (TLD) servers, and then authoritative name servers.

    • TLD servers are responsible for domain extensions such as .com and .gov.

    • Authoritative name servers are responsible for the main part of the domain, such as tryhackme or google.

    • When an authoritative name server is reached, it will send the requested data back to the computer.

What is DNS short for?

Domain Name System

The Domain Name System the protocol that allows us to use easy-to-remember names to communicate with devices on the Internet.

What is the first type of DNS server your computer would query when you search for a domain?

recursive

A recursive DNS server will be the queried by a computer first. It will check its cache for an address before going to a root server to seek out an answer.

What type of DNS server contains records specific to domain extensions (i.e. .com, .co.uk*, etc)*? Use the long version of the name.

top-level domain

Top-level domains are the contains records for domain extensions such as .com and .gov.

Where is the very first place your computer would look to find the IP address of a domain?

hosts file

A computer first looks in the hosts file to see if an IP address has been explicitly mapped to a domain

[Research] Google runs two public DNS servers. One of them can be queried with the IP 8.8.8.8, what is the IP address of the other one?

8.8.4.4

Search "Google public DNS servers" on Google.

If a DNS query has a TTL of 24 hours, what number would the dig query show?

86400

Dig shows time in seconds, so the query would show $24 \cdot 60 \cdot 60 = 86400$.

Task 9: Further Reading


Last updated 4 months ago

Headers and sometimes footers are added to data at each layer in the OSI model through a process called encapsulation.
The OSI and TCP/IP models have different layers but cover the same functionality.

by Steve McQuerry is a great resource to learn more about networking theory.

⋅ ⋅

CISCO Self Study Guide
Work
Thoughts
Home