Heyyyy! Here's some notes from the hackthebox academy intro to networking - feel free to look at these notes and please view the original here!
Networking Overview:
A network enables two computers to communicate with each other.
There is many arrays of topologies (mesh/tree/star)
mediums(ethernet/fiber/coax/wireless)
protocols (TCP/UDP/IPX)
Setting up flat networks isn't extremely difficult and can be a reliable network operationally. However, building a flat network is best comparable to building a house on a plot a land and considering it to be safe because of having a lock on the door. You can create defense networks for said networks. Pivoting networks isn't difficult but doing it quickly and silently is tough and will slow attackers down.
Pentester story:
Most networks will use a /24 subnet to a point most pentesters will set this subnet mask (255.255.255.0) without checking whatsoever. This network allows computers to communicate as long as the first three octets of an IP are the same (example: 142.069.1.xxx). Setting the subnet to 25 divides this range in half and computers will only be able to communicate to its respective half, the pentester claimed that the domain controller was offline when it was just on a different network. The network structure looked something like this:
- Server Gateway: 10.20.0.1/25
- Domain Controller: 10.20.0.10/25
- Client Gateway: 10.20.0.129/25
- Client Workstation: 10.20.0.200/25
- Pentester IP: 10.20.0.252/24 (Set Gateway to 10.20.0.1)

- The difference between URL's and FQDN's are that
- FQDN's such as "spacehey.com" only specifies a specific "building" so-to-speak.
- As URL's such as maybe "spacehey.com/NaNam1 (hey that's my profile!)" Specifies a "floor" in the building..
- A web server would best be compared to a DMZ/Demilitarized zone since clients online can make communications with a website, making it more likely to become compromised. Placing it in a separate network would allow admins to put networking protection between web servers and other devices.
- Workstations should be on their own network, and in a perfect world should have a rule preventing contact with other workstations. If a workstation is on a same network as a server, man-in-the-middle or spoofing could become a very bad issue.
- The switch and router should be on an administration network, which would prevent snooping from workstations.
- IP phones should be on their own network so computers won't be able to eavesdrop on communications... you wouldn't want someone peeking at your IM's after all, hm?
- Printers should be on their own network as its impossible to secure. Your computer would use NTLMv2 authentication which can lead into stealing passwords... plus printers have very good persistence AND have tons of sensitive info :P




Comments
Displaying 0 of 0 comments ( View all | Add Comment )