SlideShare a Scribd company logo
IP, DNS AND MAC
CONCEPTS
MOHAMMAD IRSHAAD
ABDOOL
B131200052
WWW.IRSHAAD.ME
CONTENTS
Basic Networking
IP
DNS
ARP
Internet
Network attacks
MODEM
ROUTER
SWITCH
WIRELESS
ACCESS POINT
TELEPHONE NETWORK
TO ISP
DESKTOP PC
1
DESKTOP PC
2
LAPTOP PC
1
MODEM
Data transmitted from local network to ISP on telephone lines
Telephone lines uses analog data
Local network uses digital data
From network to telephone line: Digital to Analog [MODULATION]
From telephone line to network: Analog to Digital [DEMODULATION]
Modem – Modulator DEModulator
ROUTER
Responsible for routing data across network
Forwards data across the network to the intended device
Also used to connect different network lines between them
Keeps a list of devices with their MAC Addresses and
assigned IP Addresses
NETWORK SWITCH
Connects wired devices to the network
Reads packets’ headers and forward data packet to the destination
client
Usually has Ethernet interfaces
Routers have Ethernet ports to add devices but ports limited
Switches can be up to 32 ports in one device
WIRELESS ACCESS POINT
Allows devices to connect to a network wirelessly
Usually uses Wi-Fi
Can connect multiple-devices at the same time
Can be configured into clients or repeaters
WIRED AND WIRELESS CLIENTS
Wired
Ethernet port
Wireless
Wi-Fi
MAC ADDRESS
Physical address of the Network Interface Card
Unique identifier
Varies from manufacturer to manufacturer, card to card, device to
device
Typical format: 01:23:45:67:89:ab / 01-23-45-67-89-ab
Six groups of two hexadecimal digits separated by : or -
TCP/IP - IP ADDRESS
Computers communicate using the TCP/IP protocol
Maintained by Internet Engineering Task Force
TCP/IP provides end-to-end connectivity and defines how data is
packetized, addressed, transmitted and received on the network
IP is on the second layer of the TCP/IP layer
IP address – unique number set used to communicate on the network
IPv4 and IPv6
IPV4 V/S IPV6
IPv4
1981
32-bit address - 4,294,967,296
Format: 192.168.10.12
Manually assigned
DHCP assigned
IPv6
1998
128-bit address – 3.4 x 1038
2001:0db8:85a3:0000:0000:8a2
e:0370:7334
Created from the subnet
identifier and device’s physical
identifier (MAC)
OSI MODEL V/S TCP/IP
DYNAMIC HOST CONFIGURATION
PROTOCOL
Found in application layer of the Internet Protocol Suite (TCP/IP)
Dynamically distributes network configuration parameters to hosts
Reduces manual configuration of individual hosts on network
Network hosts request IP address and configuration from DHCP
Four Phases – DORA
Server Discovery – IP lease offer – IP request – IP lease
acknowledgement
ADDRESS RESOLUTION PROTOCOL
Used to resolve network layer addresses to link layer addresses
Conversion needed when transmitting packets
When an Internet Protocol (IP) datagram is sent from one host to
another on a local area network, the destination IP address must be
resolved to a MAC address for transmission via the data link layer.
When another host's IP address is known, and its MAC address is
needed, a broadcast packet is sent out on the local network. This
packet is known as an ARP request. The destination machine with the
IP in the ARP request then responds with an ARP reply, which contains
the MAC address for that IP. - Wikipedia
INTERNET
INTERNET – DNS
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
50.62.71.1
>> www.facebook.com
INTERNET – DNS
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
50.62.71.1
>> www.facebook.com
NAME ADDRESS
google.com 173.194.112.1
99
facebook.com 173.252.120.6
irshaad.me 50.62.71.1
INTERNET – DNS
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
50.62.71.1
>> www.facebook.com
NAME ADDRESS
google.com 173.194.112.1
99
facebook.com 173.252.120.6
irshaad.me 50.62.71.1>> 173.252.120.6
NETWORK ATTACKS
ARP SPOOFING
ARP SPOOFING – MAN IN THE
MIDDLE ATTACK
COMPUTER A – 192.168.1.10
COMPUTER B – 192.168.1.12
ROUTER
HOST MAC
ADDRESS
192.168.1.1
2
BB:BB:BB:BB:B
B
HOST MAC ADDRESS
192.168.1.
10
AA:AA:AA:AA:
AA
ARP SPOOFING – MAN IN THE
MIDDLE ATTACK
COMPUTER A – 192.168.1.10 – AA:AA:AA:AA:AA
COMPUTER B – 192.168.1.12 – BB:BB:BB:BB
ROUTER
HOST MAC
ADDRESS
192.168.1.1
2
BB:BB:BB:BB:B
B
HOST MAC ADDRESS
192.168.1.
10
AA:AA:AA:AA:
AA
COMPUTER e – 192.168.1.15
– ee.ee.ee.ee.ee
HOST MAC ADDRESS
192.168.1.
10
AA:AA:AA:AA:
AA
192.168.1. BB:BB:BB:BB:BB
ARP SPOOFING – MAN IN THE
MIDDLE ATTACK
COMPUTER A – 192.168.1.10 – AA:AA:AA:AA:AA
COMPUTER B – 192.168.1.12 – BB:BB:BB:BB
ROUTER
HOST MAC
ADDRESS
192.168.1.1
2
EE:EE:EE:EE:E
E
HOST MAC ADDRESS
192.168.1.
10
EE:EE:EE:EE:EE
COMPUTER e – 192.168.1.15
– EE:EE:EE:EE:EE
HOST MAC ADDRESS
192.168.1.
10
AA:AA:AA:AA:
AA
192.168.1. BB:BB:BB:BB:BB
ARP SPOOFING – MAN IN THE
MIDDLE ATTACK
COMPUTER A – 192.168.1.10 – AA:AA:AA:AA:AA
COMPUTER B – 192.168.1.12 – BB:BB:BB:BB
ROUTER
HOST MAC
ADDRESS
192.168.1.1
2
EE:EE:EE:EE:E
E
HOST MAC ADDRESS
192.168.1.
10
EE:EE:EE:EE:EE
COMPUTER e – 192.168.1.15
– EE:EE:EE:EE:EE
HOST MAC ADDRESS
192.168.1.
10
AA:AA:AA:AA:
AA
192.168.1. BB:BB:BB:BB:BB
DNS SPOOFING
DNS SPOOFING
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
202.124.55.12
DNS SPOOFING
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
202.124.55.12
>> www.facebook.com
NAME ADDRESS
google.com 173.194.112.1
99
facebook.com 173.252.120.6
irshaad.me 50.62.71.1
DNS SPOOFING
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
202.124.55.12
>> www.facebook.com
NAME ADDRESS
google.com 173.194.112.1
99
facebook.com 202.124.55.12
irshaad.me 50.62.71.1
DNS SPOOFING
INTERNET
DNS SERVER
USER
173.194.112.199
173.252.120.6
202.124.55.12
>> www.facebook.com
>> 202.124.55.12
NAME ADDRESS
google.com 173.194.112.1
99
facebook.com 202.124.55.12
irshaad.me 50.62.71.1
QUESTIONS
1. How does a Web user get to a website. Explain the network part briefly.
The user type the address (e.g www.google.com) in the address bar. The PC
connects to the ISP’s DNS server to do a lookup of the www.google.com’s IP on the
network. The browser then connects to the web server at the IP address and
downloads the page from there.
2. What is an MITM? Give an example.
A Man-In-The-Middle attack is one whereby a pirate user intercepts traffic on a
network using ARP Poisoning. It can then modify the packets as they pass
through. E.g: A PC is connected to a router and browsing the Internet. A rogue PC
connects and fools the network devices so as the PC sends packets to the rogue
RC rather than the legit PC and vice-versa. The Rogue PC does same by spoofing
its MAC address in the devices hosts lists (Temporary MAC address storage file).
3. What are the basic differences between IPv4 and IPv6.
Address Pool: IPv4 has around 4 x 109 addresses; IPv6 has around 3.4 x 1038
Address creation: IPv4 is DHCP issued (normally); IPv6 is created by the client itself
THANK YOU FOR YOUR
ATTENTION
www.irshaad.me

More Related Content

What's hot (20)

PPTX
Firewall (2)
marghali
 
PPT
Linux Operating System Vulnerabilities
Information Technology
 
PPTX
Basics of IP Addressing
Kushal Sheth
 
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
PDF
Fundamentals of Computer Networking
Pulkit Singhal
 
PPTX
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
 
PPT
Domain name service
ishapadhy
 
PPTX
Network security presentation
Kudzai Rerayi
 
PDF
Read Access Logging (RAL) for SAP NetWeaver Overview
SAP Technology
 
PPT
Networking presentation
Jyoti Tewari
 
PDF
Cyber Ethics
Erdo Deshiant Garnaby
 
PPTX
Ip addressing
Tanvir Amin
 
PPT
Software security
Roman Oliynykov
 
PDF
Common ports
munaatyaf
 
ODP
Ethical hacking ppt
himanshujoshi238
 
PPTX
Cyberstalking (Computer Crime)
rayarren06
 
PDF
iot hacking, smartlockpick
idsecconf
 
PPSX
Cyber crime
Mukul Kumar
 
PDF
Web Saldırı Teknikleri & Korunma Yöntemleri
Talha Kabakus
 
Firewall (2)
marghali
 
Linux Operating System Vulnerabilities
Information Technology
 
Basics of IP Addressing
Kushal Sheth
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
Fundamentals of Computer Networking
Pulkit Singhal
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
 
Domain name service
ishapadhy
 
Network security presentation
Kudzai Rerayi
 
Read Access Logging (RAL) for SAP NetWeaver Overview
SAP Technology
 
Networking presentation
Jyoti Tewari
 
Cyber Ethics
Erdo Deshiant Garnaby
 
Ip addressing
Tanvir Amin
 
Software security
Roman Oliynykov
 
Common ports
munaatyaf
 
Ethical hacking ppt
himanshujoshi238
 
Cyberstalking (Computer Crime)
rayarren06
 
iot hacking, smartlockpick
idsecconf
 
Cyber crime
Mukul Kumar
 
Web Saldırı Teknikleri & Korunma Yöntemleri
Talha Kabakus
 

Similar to IP, DNS and MAC concepts (20)

PDF
Introduction to Network Fundamentals
Mohammed Adam
 
PPTX
Support-Protocols ARP, RARP tcp tcmp .pptx
FredarmelNKETCHEMEN
 
PPTX
Cours de réseau internet sur les protocoles et technologies réseaux arp
FredarmelNKETCHEMEN
 
PDF
Communication networks_ARP
GouravSalla
 
PPT
Lecture7-8-Network Protocls attack in cyber.ppt
MuhammadSaleemKhan26
 
PPT
network-security_for cybersecurity_experts
abacusgtuc
 
PPTX
Internet architecture protocol
GLIM Digital
 
PPT
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
Eric Vanderburg
 
PPT
IP adress and routing(networking)
welcometofacebook
 
PPTX
Basic Foundation For Cybersecurity
Mohammed Adam
 
PPT
Arp spoofing
Luthfi Widyanto
 
PPTX
A day in the life of a Web Request
MD.ANISUR RAHMAN
 
PDF
Network Intrusion Ditection System
Hitesh Mohapatra
 
PPTX
Computer network coe351- part3-final
Taymoor Nazmy
 
PPTX
presentation of first program exist.pptx
MajidAzeemChohan
 
DOCX
Chapter 11Networks of NetworksChapter 11 OutlineNetwor.docx
bartholomeocoombs
 
PPT
ARP.ppt
Jayaprasanna4
 
PPTX
Week6 final
Irfan Ali Memon
 
PPTX
IP address and Domain name
University of Technology - Iraq
 
PDF
Arp config-arp
Raafat younis
 
Introduction to Network Fundamentals
Mohammed Adam
 
Support-Protocols ARP, RARP tcp tcmp .pptx
FredarmelNKETCHEMEN
 
Cours de réseau internet sur les protocoles et technologies réseaux arp
FredarmelNKETCHEMEN
 
Communication networks_ARP
GouravSalla
 
Lecture7-8-Network Protocls attack in cyber.ppt
MuhammadSaleemKhan26
 
network-security_for cybersecurity_experts
abacusgtuc
 
Internet architecture protocol
GLIM Digital
 
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
Eric Vanderburg
 
IP adress and routing(networking)
welcometofacebook
 
Basic Foundation For Cybersecurity
Mohammed Adam
 
Arp spoofing
Luthfi Widyanto
 
A day in the life of a Web Request
MD.ANISUR RAHMAN
 
Network Intrusion Ditection System
Hitesh Mohapatra
 
Computer network coe351- part3-final
Taymoor Nazmy
 
presentation of first program exist.pptx
MajidAzeemChohan
 
Chapter 11Networks of NetworksChapter 11 OutlineNetwor.docx
bartholomeocoombs
 
ARP.ppt
Jayaprasanna4
 
Week6 final
Irfan Ali Memon
 
IP address and Domain name
University of Technology - Iraq
 
Arp config-arp
Raafat younis
 
Ad

Recently uploaded (20)

PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Ad

IP, DNS and MAC concepts

  • 1. IP, DNS AND MAC CONCEPTS MOHAMMAD IRSHAAD ABDOOL B131200052 WWW.IRSHAAD.ME
  • 3. MODEM ROUTER SWITCH WIRELESS ACCESS POINT TELEPHONE NETWORK TO ISP DESKTOP PC 1 DESKTOP PC 2 LAPTOP PC 1
  • 4. MODEM Data transmitted from local network to ISP on telephone lines Telephone lines uses analog data Local network uses digital data From network to telephone line: Digital to Analog [MODULATION] From telephone line to network: Analog to Digital [DEMODULATION] Modem – Modulator DEModulator
  • 5. ROUTER Responsible for routing data across network Forwards data across the network to the intended device Also used to connect different network lines between them Keeps a list of devices with their MAC Addresses and assigned IP Addresses
  • 6. NETWORK SWITCH Connects wired devices to the network Reads packets’ headers and forward data packet to the destination client Usually has Ethernet interfaces Routers have Ethernet ports to add devices but ports limited Switches can be up to 32 ports in one device
  • 7. WIRELESS ACCESS POINT Allows devices to connect to a network wirelessly Usually uses Wi-Fi Can connect multiple-devices at the same time Can be configured into clients or repeaters
  • 8. WIRED AND WIRELESS CLIENTS Wired Ethernet port Wireless Wi-Fi
  • 9. MAC ADDRESS Physical address of the Network Interface Card Unique identifier Varies from manufacturer to manufacturer, card to card, device to device Typical format: 01:23:45:67:89:ab / 01-23-45-67-89-ab Six groups of two hexadecimal digits separated by : or -
  • 10. TCP/IP - IP ADDRESS Computers communicate using the TCP/IP protocol Maintained by Internet Engineering Task Force TCP/IP provides end-to-end connectivity and defines how data is packetized, addressed, transmitted and received on the network IP is on the second layer of the TCP/IP layer IP address – unique number set used to communicate on the network IPv4 and IPv6
  • 11. IPV4 V/S IPV6 IPv4 1981 32-bit address - 4,294,967,296 Format: 192.168.10.12 Manually assigned DHCP assigned IPv6 1998 128-bit address – 3.4 x 1038 2001:0db8:85a3:0000:0000:8a2 e:0370:7334 Created from the subnet identifier and device’s physical identifier (MAC)
  • 12. OSI MODEL V/S TCP/IP
  • 13. DYNAMIC HOST CONFIGURATION PROTOCOL Found in application layer of the Internet Protocol Suite (TCP/IP) Dynamically distributes network configuration parameters to hosts Reduces manual configuration of individual hosts on network Network hosts request IP address and configuration from DHCP Four Phases – DORA Server Discovery – IP lease offer – IP request – IP lease acknowledgement
  • 14. ADDRESS RESOLUTION PROTOCOL Used to resolve network layer addresses to link layer addresses Conversion needed when transmitting packets When an Internet Protocol (IP) datagram is sent from one host to another on a local area network, the destination IP address must be resolved to a MAC address for transmission via the data link layer. When another host's IP address is known, and its MAC address is needed, a broadcast packet is sent out on the local network. This packet is known as an ARP request. The destination machine with the IP in the ARP request then responds with an ARP reply, which contains the MAC address for that IP. - Wikipedia
  • 16. INTERNET – DNS INTERNET DNS SERVER USER 173.194.112.199 173.252.120.6 50.62.71.1 >> www.facebook.com
  • 17. INTERNET – DNS INTERNET DNS SERVER USER 173.194.112.199 173.252.120.6 50.62.71.1 >> www.facebook.com NAME ADDRESS google.com 173.194.112.1 99 facebook.com 173.252.120.6 irshaad.me 50.62.71.1
  • 18. INTERNET – DNS INTERNET DNS SERVER USER 173.194.112.199 173.252.120.6 50.62.71.1 >> www.facebook.com NAME ADDRESS google.com 173.194.112.1 99 facebook.com 173.252.120.6 irshaad.me 50.62.71.1>> 173.252.120.6
  • 21. ARP SPOOFING – MAN IN THE MIDDLE ATTACK COMPUTER A – 192.168.1.10 COMPUTER B – 192.168.1.12 ROUTER HOST MAC ADDRESS 192.168.1.1 2 BB:BB:BB:BB:B B HOST MAC ADDRESS 192.168.1. 10 AA:AA:AA:AA: AA
  • 22. ARP SPOOFING – MAN IN THE MIDDLE ATTACK COMPUTER A – 192.168.1.10 – AA:AA:AA:AA:AA COMPUTER B – 192.168.1.12 – BB:BB:BB:BB ROUTER HOST MAC ADDRESS 192.168.1.1 2 BB:BB:BB:BB:B B HOST MAC ADDRESS 192.168.1. 10 AA:AA:AA:AA: AA COMPUTER e – 192.168.1.15 – ee.ee.ee.ee.ee HOST MAC ADDRESS 192.168.1. 10 AA:AA:AA:AA: AA 192.168.1. BB:BB:BB:BB:BB
  • 23. ARP SPOOFING – MAN IN THE MIDDLE ATTACK COMPUTER A – 192.168.1.10 – AA:AA:AA:AA:AA COMPUTER B – 192.168.1.12 – BB:BB:BB:BB ROUTER HOST MAC ADDRESS 192.168.1.1 2 EE:EE:EE:EE:E E HOST MAC ADDRESS 192.168.1. 10 EE:EE:EE:EE:EE COMPUTER e – 192.168.1.15 – EE:EE:EE:EE:EE HOST MAC ADDRESS 192.168.1. 10 AA:AA:AA:AA: AA 192.168.1. BB:BB:BB:BB:BB
  • 24. ARP SPOOFING – MAN IN THE MIDDLE ATTACK COMPUTER A – 192.168.1.10 – AA:AA:AA:AA:AA COMPUTER B – 192.168.1.12 – BB:BB:BB:BB ROUTER HOST MAC ADDRESS 192.168.1.1 2 EE:EE:EE:EE:E E HOST MAC ADDRESS 192.168.1. 10 EE:EE:EE:EE:EE COMPUTER e – 192.168.1.15 – EE:EE:EE:EE:EE HOST MAC ADDRESS 192.168.1. 10 AA:AA:AA:AA: AA 192.168.1. BB:BB:BB:BB:BB
  • 27. DNS SPOOFING INTERNET DNS SERVER USER 173.194.112.199 173.252.120.6 202.124.55.12 >> www.facebook.com NAME ADDRESS google.com 173.194.112.1 99 facebook.com 173.252.120.6 irshaad.me 50.62.71.1
  • 28. DNS SPOOFING INTERNET DNS SERVER USER 173.194.112.199 173.252.120.6 202.124.55.12 >> www.facebook.com NAME ADDRESS google.com 173.194.112.1 99 facebook.com 202.124.55.12 irshaad.me 50.62.71.1
  • 29. DNS SPOOFING INTERNET DNS SERVER USER 173.194.112.199 173.252.120.6 202.124.55.12 >> www.facebook.com >> 202.124.55.12 NAME ADDRESS google.com 173.194.112.1 99 facebook.com 202.124.55.12 irshaad.me 50.62.71.1
  • 30. QUESTIONS 1. How does a Web user get to a website. Explain the network part briefly. The user type the address (e.g www.google.com) in the address bar. The PC connects to the ISP’s DNS server to do a lookup of the www.google.com’s IP on the network. The browser then connects to the web server at the IP address and downloads the page from there. 2. What is an MITM? Give an example. A Man-In-The-Middle attack is one whereby a pirate user intercepts traffic on a network using ARP Poisoning. It can then modify the packets as they pass through. E.g: A PC is connected to a router and browsing the Internet. A rogue PC connects and fools the network devices so as the PC sends packets to the rogue RC rather than the legit PC and vice-versa. The Rogue PC does same by spoofing its MAC address in the devices hosts lists (Temporary MAC address storage file). 3. What are the basic differences between IPv4 and IPv6. Address Pool: IPv4 has around 4 x 109 addresses; IPv6 has around 3.4 x 1038 Address creation: IPv4 is DHCP issued (normally); IPv6 is created by the client itself
  • 31. THANK YOU FOR YOUR ATTENTION www.irshaad.me