Posts

Showing posts with the label networking

APAN 56 - Sri Lanka

Image
I witnessed to APAN56, was held in August 2023 in Sri Lanka, which was hosted by LEARN - Lanka Education And Research Network. https://arteculate.asia/learn-hosts-apan56-sri-lanka/

Cell Signal Monitor

Image
A mobile application for monitoring SIM  cards on the device

Network/Data Traffic Monitor

Image
A simple Network, Data and traffic monitor on mobile device helps to know the details of traffic and network connections that a mobile can not show directly. When starting using this mobile application on the device, the permissions for tracking traffics should be allowed. Appears on the notifications Settings on the application Application gives the options for the notifications on the mobile device Network Traffic monitoring of the device on the application Details about network traffics and the applications.  Applying Upper-left corner sets the notifications on the upper left corner of the device as the screenshot is shown above. Details about the network device is in use. In the figure x.x.x.x is the public IP address of the network is using for accessing data on the network. 192.168.1.1 is the gateway for the network of 192.168.1.0/24, and currently 192.168.1.3 is used by the mobile network where the monitoring application is installed on.

Netx - hands on

Image
A mobile application to get thr details about the LAN that we are connected icon of the mobile application details of the connected devices in the LAN network Facilities, it provides Monitoring the uploads and downloads ping tool ports and protocols of an ip address

Wireshark

Wireshark tool can be used to packet sniffing and we can get the data stream which are sending via FTP, Telnet since FTP and Telnet are not using encryption when sending data. When we using wireshark, we can filter the packets by protocol and the data packet is containing which is sent. They are containing sequentially and FTP or Telnet is not secure enough to send sensitive data.   We can sniff SSH packets but we can not get the data as the data is encrypted.

Project(on going) - IPv6 Fragmentation

An IP Datagram travels over different networks, each of which may have different MTU (Maximum Transmit Unit ) , which is the largest IP datagram that can be carried by a network. MTU - - maximum size of an unit which can be transmitted in a network and it depends on the network and media and how they be allowed to transmitted. also encapsulation....etc. It happens when the MTU values of hosts and routers are different from each other;         When we have two different type of network/media connected with router which have different MTU in such case router broke down packet to appropriate size regarding network/media type payload exceed the Maximum Transmission Unit in the interface. so the payload has to be chopped and put them into IP fragmented packets. they are:     -reassembled at destination     -each fragment is independent datagram        - could be routed in a different direction ...

Note - Hakcing

Hacker     -is someone who likes to tinker with the electronics or computer systems and he is a person, full of...                 creativity         Will to learn         knowledge is power         patience         programming to be an elite hacker Hacker Heirachy         Script kiddies         wanna be hackers         have no hacking skills and use the tools developed by others         no knowledge of what's happening behind the scene     Intermediate Hackers         usually about computers, networks, and enough programning knowledge to understand what a script might do             Elite...

Note - Nmap

Nmap Introduction                - is a security scanner and Network Mapper is a free and opens source utility for network explorations and security audition.           -is used to discover hosts and services on the computer network thus creating a "map" of the network.          - sends specially crafted packets to the target host and then analyzes the response.          -uses raw IP packets in novel ways to determine what hosts are available on the network , what services those services are offering , what operation systems they are running supports all platform of OS like                    -linux                   -Microsoft                   - Mac In n...

Networking interview questions

Few Interview questions for students who is intersted in networking can go for the questions .

Note - Networking

Networking      Involves connecting computers to create a local area network. For sharing information and resources For sharing hardware and software For Provide centralized administration and support There are two major types of network LAN           In LAN there are several topologies. They are, Mesh topology Star topology             Advantages to the star topology are                     -central wiring hubs ease the task of managing moves , additions and changes                    -central cabling points provide faster troubleshooting                    -independent point to point links prevent c...

Note - Basics in Netwok Security

This is a information age.In the network, the privacy is needed when the information are tranfered through internet and informations need to be secured from attacks. There are three major goals of information security. Confidentiality (Unauthorized access) Integrity (Unauthorized change) Availability (Available to authorized entities when it is needed)  as "security goals". According to them the security attacks are, under confidentiality :  Snooping -Refers unauthorized access to or interception of data. Traffic analysis - obtaining some other type of information by monitoring online traffic.     2. Integrity : Modification - attacker intercepts and change the message. Masquerading - (Spoofing) when attacker impassionate somebody         else. Replaying- have a copy of the message and try to reply it. Repudiation - the party who sends the message refuse to take the responsibility.   ...