Things I want to know more about ops 301 class 1 reading - reedraheem/Things-I-want-to-know-more-about- GitHub Wiki

Readings: Network Traffic Analysis with Wireshark

Reading

What does “OSI” stand for?

Open Systems Interconnection.

List the 7 layers of the OSI model and what each one is responsible for.

Physical Layer,Data Link Layer (DLL),Network Layer,Transport Layer,Session Layer,Presentation Layer,Application Layer

Distinguish which layers are the “hardware layers”, and which layers are the “software layers”. What does that even mean?

Hardware Layers:

Physical Layer: The physical layer is considered a hardware layer because it deals with the transmission of raw data bits over physical mediums such as cables, connectors, and network interface cards (NICs). It defines the electrical, mechanical, and procedural aspects of physical network communication.

Software Layers:

  1. Data Link Layer: The data link layer can be considered a software layer as it encompasses the protocols and software mechanisms that enable reliable communication between adjacent nodes on a network. It manages data framing, error detection, and flow control.

Network Layer: The network layer is a combination of both hardware and software elements. It involves hardware devices like routers that facilitate the routing of network packets across multiple networks. However, it also includes software components such as routing protocols that determine the best path for packet delivery.

Transport Layer: The transport layer is primarily a software layer. It provides services such as reliable data transfer, error recovery, and flow control. These services are implemented through software protocols like TCP (Transmission Control Protocol) or UDP (User Datagram Protocol).

Session Layer: The session layer is also a software layer. It establishes, manages, and terminates connections between applications. It provides mechanisms for session establishment, synchronization, and data exchange coordination.

Presentation Layer: The presentation layer is mainly a software layer. It is responsible for translating, formatting, and encrypting data to be transmitted over the network. It handles tasks such as data compression, encryption, and data format conversion.

Application Layer: The application layer is primarily a software layer. It represents the interface between the user and the network, allowing applications to access network services. Examples of applications that operate at this layer include web browsers, email clients, and file transfer protocols.

How can the OSI model be used in troubleshooting?

Protocol Analysis:The OSI model helps in analyzing and understanding the behavior of network protocols. By examining the flow of data and control information at each layer, you can identify any anomalies or misconfigurations that might be causing the problem.

What is Wireshark?

Wireshark is a popular open-source network protocol analyzer that allows you to capture and analyze network traffic in real-time. It is widely used by network administrators, security professionals, and developers for troubleshooting, network analysis, and protocol development.

What is a packet?

Packet is the name given to a discrete unit of data in a typical Ethernet network.

What 3 high-level things does Wireshark accomplish? How could these be used for nefarious purposes? For benevolent purposes?

Packet Capture and Analysis: Wireshark captures network packets and provides detailed analysis of the captured data. It allows users to inspect packet headers, payloads, and other information related to network protocols. This enables the identification of network issues, troubleshooting, and understanding the behavior of network traffic.

For nefarious purposes: Wireshark could be potentially misused for unauthorized network monitoring and eavesdropping. In the wrong hands, an attacker could capture sensitive information, such as passwords, confidential data, or personally identifiable information (PII), by intercepting network traffic.

For benevolent purposes: Wireshark can be used by network administrators and security professionals to diagnose and troubleshoot network problems, ensuring the stability and security of the network infrastructure. It helps in detecting network vulnerabilities, identifying potential security threats, and implementing appropriate measures to protect against attacks.

Protocol Analysis: Wireshark enables the analysis of network protocols by decoding captured packets and presenting the information in a human-readable format. It helps in understanding the structure, behavior, and communication patterns of different protocols.

For nefarious purposes: An attacker could leverage Wireshark's protocol analysis capabilities to study network protocols and identify potential vulnerabilities or weaknesses. This knowledge could be exploited to launch targeted attacks or develop malicious software that exploits protocol vulnerabilities.

For benevolent purposes: Wireshark aids protocol developers and testers in ensuring proper protocol implementation and compliance. It allows them to analyze protocol interactions, validate data formats, and identify any inconsistencies or errors. This helps in developing robust and reliable network protocols.

Network Security Analysis: Wireshark assists in network security analysis by examining network traffic for signs of malicious activity, unauthorized access attempts, or network intrusions. It helps in detecting and responding to security incidents and provides insights into potential security vulnerabilities.

For nefarious purposes: In the wrong hands, an attacker could use Wireshark to monitor network traffic for sensitive information, such as login credentials, financial details, or confidential communications. They could also use it to study security measures implemented by organizations and devise strategies to bypass or exploit them.

For benevolent purposes: Wireshark is an essential tool for security professionals and incident responders. It enables them to identify and investigate security incidents, analyze network traffic for indicators of compromise, and gather evidence for forensic investigations. It helps in maintaining the security and integrity of computer networks.

Reference:Chat gpt