You are on page 1of 22

01

Networking
Session 3
How do internet work?

02

Internet-: It is a network of computer throughout the world


Networking: The fundamental of Hacking

A network is a collection of computers, servers,


mainframes, network devices, peripherals, or other
devices connected to one another to allow the
03
sharing of data.
This is what you think
how internet works

Data Sharing
Let’s dive deep into Internet and Networks

This is what you think how


internet works
04

Data Sharing

RFC (Request for Comments)- It is the


phenomenon used to develop protocols.
Protocols

★ TCP(Transmission Control Protocol)


★ IP(Internet Protocol)
★ UDP(User Datagram Protocol)
05
★ FTP(File Transfer Protocol)
★ HTTP(Hyper Text Transfer Protocol)
★ HTTPS(Hyper Text Transfer Protocol Secure)
★ SMTP(Simple Mail Transfer Protocol)
Working Of HTTP and HTTPS

06

When you search anything your computer create a request


for your search and to understand how this process is
working I have a great example.
Working of HTTP and HTTPS
Imaginary Explanation

07
Working of HTTP and HTTPS
Technical Explanation

08
Working of HTTP and HTTPS
Technical Explanation

NOTE
Every Computer has its own
DNS server.
09
Working of HTTP and HTTPS
Technical Explanation

NOTE
1.Port 80 and 443 are the two
ports used for http and https

2.Everything connected to 10
internet has their own ports.

3.We will talk about it in more


details in a bit.
Working of HTTP and HTTPS
Technical Explanation

If everything until here is successful then your


computer creates HTTP/HTTPS request.
11
Working of HTTP and HTTPS
Technical Explanation

This is how HTTP


requests look.
12
Working of HTTP and HTTPS
Technical Explanation

This is how HTTP


response look.
13
Working of HTTP and HTTPS
Technical Explanation

14
HTTP/HTTPS Method

★ GET - The GET method is used to retrieve information from the given
server using a given URI. Requests using GET should only retrieve data and
should have no other effect on the data
15
★ HEAD - Same as GET, but transfers the status line and header section
only

★ POST - A POST request is used to send data to the server, for example,
customer information, file upload, etc. using HTML forms

★ PUT - This method is used to update the existing data on server, for
example, when you change your username.
HTTP/HTTPS Method

★ DELETE - The method delete is use to remove or delete the existing data
on a server.

★ OPTIONS - This method is used to display the http method particular 16


target uses.

★ TRACE - It allows the client to see what is being received at the other end
of the request chain and use that data for testing or diagnostic information
IP Address

Internet Protocol addresses (IP addresses) makes the world go 'round.


Or, at least, enable us to email, Skype, and navigate the web. It's almost
as important as the world going around!
17

Each digital device (computer, laptop, phone, tablet, etc.) is assigned an


IP address, and this is what enables us to communicate and connect with
it. Imagine an IP address as similar to your house address. Without that
address, no one could find you and send you snail mail
Types of IP Address

1. Public IP Address
2. Private IP Address
18
Public IP Address

It’s your public IP Address which keep changing when you change
your internet connection or reset your internet connection.
19
Private IP Address

You have probably seen the private IP addresses beginning with


192.168.xxx.xxx or 10.xxx.xxx.xxx on your Kali system when you
type ifconfig. 20
Ports

● 20 FTP ● 135 Microsoft RPC


● 21 FTP ● 137-139 Microsoft's NetBIOS
● 22 SSH ● 143 IMAP
● 23 Telnet ● 161 SNMP 21

● 25 SMTP ● 389 LDAP


● 53 DNS ● 443 HTTPS or HTTP over SSL
● 69 TFTP ● 445 SMB
● 80 HTTP ● 500 IKE
● 88 Kerberos ● 514 syslog
● 110 POP3 ● 3389 RDP
● 123 NTP
You got this!
22

Relax and enjoy the process of


learning.

See you all in the next session on:


Wireshark : Network Analysis

You might also like