What's the blog about?

Hello! Welcome to BlackWolf's Blog page

The aim of this blog is for me to annotate all of my work, ranging from book reviews, malware disassembly, projects I've been working on, what materials I've used to study. In short, this blog post is a collection of all the projects I've worked on, what books I've read, what courses I've been taking. As well as small guides on each intentionally vulnerable machines that I've solved.

This blog page also provides a multitude of benefits besides me just having my work visible. For the world of IT, documentation is of huge importance. This will drastically deepen my documentation skills and habits. As well as permitting me to show what work I may have done and showcase it to all potential future employers. Because if it isn't documented, it never happened.

Book Review; Network+ Guide


BlackWolf's Book Review
Packt's CompTIA Network+ Certification Guide 
8.5/10



What is the CompTIA Network+ Cert Guide?

If the title of the book doesn't give it away, this book is a guide for those who're looking into taking CompTIA's Network exam

The contents of this 410 paged guide shall prepare you for what the exam may pertain, the guide is by no means outdated as it was written in 2018 meaning it will still be relevant to current (2021) and future exams.

Written by the renowned cyber-security instructor Glen D. Singh and co-authored by Rishi Latchmepersad, a data centre engineer.

The guide, having been written with networking concepts in mind, covers a wide and diverse range of concepts, ranging from TCP and UDP protocols to wireless technologies like Z-Wave, RFC, RFID, satellite. To the nitty-gritty of individual IPv4 packets and frequency ranges.

My personal thoughts on the guide

This book was seemingly written for aspiring network engineers or enthusiast but even whilst aiming at an already well versed and technical audience, the book is riddled with beautifully laid out analogies permitting for those who are neither within the IT industry nor are a computer enthusiast to easily understand the advanced concepts that they cover.

The book covers a huge range of concepts which is often brought up later on, so it is of great importance to read the chapters in order as quite a significant amount of concepts are of later relevance. Whilst being an extremely informative book which aims to educate a reader on networking and anything and everything it may pertain, it was surprisingly a pretty good read. 

I rarely felt myself being bombarded with unnecessary information, but it also simultaneously gets into the nitty-gritty intrinsic details. This is something I was both surprised and thankful for, being both an easy read but technically detailed.

 

The following chapters of the book are as follows:

        Chapter      1         The OSI Reference Model and TCP/IP Stack
        Chapter      2         Network Ports, Protocols, and Topologies
        Chapter      3         Ethernet
        Chapter      4         Understanding IPv4 and IPv6
        Chapter      5         Routing and Switching Concepts
        Chapter      6         Wireless and Cloud Technologies
        Chapter      7         Network Components 
        Chapter      8         Network Virtualisation and WAN technologies
        Chapter      9         Business Continuity and Disaster Recovery Concepts
        Chapter      10       Network Identity Management and Policies
        Chapter      11       Network Security Concepts
        Chapter      12       TCP/IP Security
        Chapter      13       Organisational Security
        Chapter      14       Troubleshooting a Network


I'll briefly go over the few chapters that I found were of significant importance and concepts that are required later on throughout the guide. Most concepts within this guide are revisited, some less so than others. A few are required to help conceptualise future concepts.


Chapter One 

The OSI Reference Model and TCP/IP Stack

Chapter One, which depicts the Open Systems Interconnection model (OSI model) and goes into great detail as to what it pertains, it also compares it to the TCP/IP Protocol stack. I found that these two concepts are recurringly referred to and used frequently as the rest of the entire networking guide operates on these two concepts and each of its respective layer. I would argue that it is one of the most important concepts to familiarise yourself with if you're planning to become either a network engineer, work on enterprise network infrastructure, get into IPsec or anything that requires network troubleshooting or hardware related maintenance.

This chapter discusses the International Organisation for Standardisation's (ISO) universally adopted creation, the OSI model. Which was brought into conception in 1984. Chapter one discusses each and every layer of the OSI model, there are seven respective layers, 

Chapter One includes the seven respective layers of the OSI model, the layers are as follows, starting from the top layer, (7) Application, (6) Presentation, (5) Session, (4) Transport, (3) Network, (2) Data Link, and the bottom layer (1) Physical. The chapter proceeds to go into detail and discusses each and every one of these layers, which technologies might exist on it, what each layer is responsible for and what role it has. Make sure to fully understand and familiarise yourself with each layer, as the following chapters of the book will assume that you fully understand the role of each and every layer.

Another important and recurringly brought up concept is the TCP/IP Protocol Suite, a close sibling to the OSI model. Was commercially introduced in 1985. The TCP/IP suite is defined as consisting of four layers: (4) Application, (3) Transport, (2) Internet, (1) Data Link. The TCP/IP concept combines several of the OSI layers into fewer layers.  



Chapter Two

Network Ports, Protocols, and Topologies

Chapter Two is where this book begins to dive into networking concepts, this chapter delves into Network Ports, Protocols, and Topologies Technical requirements. For those of which who seeking to get into penetration testing, red-teaming or even blue teaming, chapter two would be of greater interest than further on chapters. It covers commonly used protocols such as SSH, FTP, SMTP and what ports they run on. It also briefly covers Network Topologies which isn't brought up too often.

What this chapter does cover is types of networks, and where they are likely to be implemented. These concepts are important as they are frequently brought up throughout the book. Concepts such as Local Area Network (LAN), Wide Area Network (WAN), Wireless Local Area Network (WLAN). And less commonly used concepts such as Metropolitan Area Network (MAN), Storage Area Network (SAN), Personal Area Network (PAN). The first three concepts will be frequently brought up and used to help conceptualise other concepts, make sure you remember these network types and their differences. 



Chapter Four

Understanding IPv4 and IPv6

Chapter Four is where I found myself having to re-read concepts and the provided analogies several times over to really develop an understanding of it, this is where concepts begin to become quite advanced and difficult to quickly understand. It discusses the format of an IPv4 packet. Then it discusses the difference between public IPv4 addresses and private ones. These were easy to understand but then later on in the chapter, it will get complex.

For myself, the concepts that took a bit for me to understand within this chapter were Subnet mask, Subnetting and creating subnets. This became a bit of a headache but is extremely important to familiarise yourself if you're ever wanting to become a network engineer or manage enterprise infrastructure. Variable Length Subnet Masking (VLSM) and subnetting a subnet, calculating the ranges. This chapter also delves into IPv6, the format of an IPv6 packet, the coexistence of IPv4 and IPv6 on a network.

This chapter greatly enriched my prior knowledge and understanding, although an immense headache, it proved to be extremely beneficial and I had to 'unlearn' a lot of what I thought I already knew. This did leave me confused before going back over it several times. This chapter is extremely important and needs to be fully understood in order to apply it in areas such as Network Segmentation and concepts such as Virtual Local Area Network (VLAN) require one to be familiar with subnetting, what a subnet mask is and so forth. Pay close attention to this even if it gives you a migraine.



Chapter Six 

Wireless and Cloud Technologies

Chapter 6 focuses on wireless technology, how Wi-Fi functions and how it's been improved over the years. This chapter helped bridge between what I already knew from using tools such as the Aircrack-ng suite and other information that really enhanced my prior knowledge of wireless networks and how they function.

Chapter 6 briefly discusses every day less commonly used wireless technologies such as Z-Wave which is used for IoT devices, ANT+ which is the technology that fitness devices such as a Fitbit or Apple watch have adopted, to more commonly used technologies such as Bluetooth (IEEE 802.15), Near Field Communication (NFC) which is the technology used in debit and credit card chips, to Radio Frequency Identification. (RFID) which is the technology used on passes used to open doors.

What chapter 6 mainly focuses on is 802.11 Wireless Standards, discussing and detailing the differences between modern routers and older models, the newer technologies developed, how routers operate and how they communicate with each device on a Wireless Local Access Network (WLAN). It also discusses frequencies such as 2.4GHz and 5GHz and how a router would run on different channels to prevent and reduce noise between residences. As well as how an antenna functions, the differences between them, such as an omnidirectional antenna and Yagi or Parabolic antenna, and power requirements, data attenuation and how data is lost over greater distances or can be impacted by electric magnetic interference (EMI

This chapter did a wonderful job of giving the pros and cons of the respective technologies, what advantages they may possess and why some technologies are preferred over others, it also discussed the vulnerabilities and weaknesses they have, how some technologies such as RFID can easily be exploited.

Then it branched all the way to Cellular technologies such as GSM, TDMA, CDMA and the famed 4G technology and LTE. Although the chapter didn't go as nearly in-depth with cellular technologies as it did with wifi, it did lend valuable insight as to how these everyday technologies function and operate both within an individual country and globally.

A lot of really cool concepts that blew me away and helped reinforce what I already knew as well as introducing new cool technologies and concepts. I benefited significantly from this chapter and will be closely looking into the concepts I had discovered from this. 


Chapter Eight

Network Virtualisation and WAN technologies

This chapter was quite a fun one, as this is where all the previously learnt concepts from all the prior chapters begin to bare its fruit as quite a considerable amount of the proceeding concepts will require one to be familiar with all the previously covered concepts as it'll combine many different technologies, protocols and so forth.

This chapter pertains to WAN technologies and concepts such as Peer to Peer (P2P), hub and spokeFull mesh. Storage technologies such as NAS and SAN. This chapter seemingly focuses on Virtualisation though, going over hypervisor which seems to be a godsend to the world of IT, hypervisor allows for the world of hardware and software to collide, this is where server equipment begins to be fully utilised, the bare-metal creation of virtual machines (VM). This chapter also includes Virtual networking components such as a Virtual Switch or vSwitch, virtual firewalls, and virtual routers


Chapter Ten

Network Identity Management, Remote Access methods

This chapter focuses on remote access and policies that surround and impact it as well as identity management. Having previously dabbled quite a fair bit with most of these technologies, this chapter didn't have too many new concepts for me, but it does have a lot of important concepts that should be understood. The concepts and technologies within this chapter will be of interest to those who plan to get into blue teaming or IPsec (IP security).

Focusing mainly on IPsec it covers; encryption, data integrity, authentication, anti-replay (a concept that was new to me), Diffie-Helman (another), and IPsec protocols such as Authentication Header (AH) and Encapsulation Security Payload (ESP) both of which were completely new concepts to me.

It also discusses Secure Socket Layer (SSL) and Transport Layer Security (TLS), VPN topologies such as Site-to-Site VPN and Remote Access VPN. And lastly protocols such as Microsoft Remote Desktop Protocol (RDP), Secure Shell (SSH) and Telnet.



Chapter Eleven

Network Security Concepts

Building off what was discussed in the previous chapter, chapter six. Chapter 11 concerns itself with Network Security, this chapter contains a significant amount of different technologies, software, hardware and preventative measures. This chapter would greatly benefit those who’re planning to become a blue teamer or a SOC team. Ranging from wireless security to types of network attacks and threats, to authentication and encryption.

Wireless security, a concept that I believe all would already be familiar with. Wireless security is the preventive measure that ensures that a private network stays exactly like that, private. In order to do this, many countermeasures have been set in place to ensure a network is secure, chapter 11 covers some of the technologies developed to do this, such as; Wire Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) which was superseded by Wi-Fi Protected Access 2 (WPA2) which was developed as numerous vulnerabilities were discovered on its predecessor.

Other technologies were created and are adopted by both enterprises and homes, Extensible Authentication Protocol or EAP, EAP Transport Layer Security (EAP-TLS), EAP Tunneled Transport Layer Security (EAP-TTLS), Protected Extensible Authentication Protocol (PEAP), MAC filtering and geofencing.

This chapter goes into detail about numerous different types of network attacks and the threats a network may face. The most commonly known type of attack Denial of Service (DoS), an attack frequently utilised by both Skiddies and state-funded groups. As Well as the three different variations of such an attack, Reflective, amplified and Distributed (DDoS). It also looks into; War-driving, Evil Twin, ransomware, DNS Poisoning, ARP Poisoning, Deauthentication, Brute force and VLAN hopping. As well as detailing other types of attack vectors; social engineering and insider threat.

This chapter then leads into Securing Networking devices, device hardening and so forth. Then mitigation techniques, which leads into network segmentation, Demilitarised zone (DMZ), honeypots and honeynets and penetration testing.



Chapter Twelve

TCP/IP Security

This chapter built off of the previous chapter, leaning more towards attack vectors, types of vulnerabilities and where and how they may arise. But unlike what the previous chapter did, chapter twelve discusses what types of attacks and vulnerabilities may lay within each layer, giving a great overview of what attack vectors a malicious actor may have within their arsenal. 

Starting off with the vulnerabilities that are exploited within the application layer; Cross-Site Scripting (XSS), SQL Injection (SQLi), Lightweight Directory Access Protocol (LDAP) injection, Cross-Site Request Forgery (Open Systems Interconnection model), Session hijacking, Cookie poisoning, and then DNS which pertains DDoS, Registrar hijacking, cache poisoning, and typosquatting.

Vulnerabilities at the Transport Layer; Fingerprinting, SYN Flooding, TCP reassembly and sequencing. And then Enumeration which pertains to DNS enumeration, DNS zone transfer, RPC Endpoint mapper, SMPT.

Vulnerabilities at the Internet Layer; Route spoofing, IP address spoofing, and then Smurf attack, teardrop attack and Ping of Death (POD) which all rely on the ICMP protocol. Vulnerabilities at the Network Access/Link Layer; ARP poisoning, sniffing, broadcasting storms and VLAN hopping.

Then wrapping up the chapter it leads into Securing TCP/IP using a DiD approach, mitigating security threats by; implementing a next-generation firewall, implementing an IPS, implementing Web Security Appliance (WSA) and implementing VPNs.

 


Final Thoughts 

With the extremely diverse range of topics all related to networking, ranging from security practices to coaxial cabling, to the individual packets and the bits within each header. To technical terms such as frames and datagrams. Wireless technologies, Internet Service Providers. To how networks mesh together to form what we know as the internet. This book covers everything in a detailed and informative way. I'm impressed with how much information was condensed into only 410 pages.

Overall, I found this book to be extremely informative, and with a few exceptions, blissfully easy to understand. I've found myself to have a greater appreciation of numerous different technologies and feel a lot more confident in networking. A vast majority of the concepts and technologies I've learnt about in this book I previously was scratching my head at when I've come across it being used in other books.

It also aided in bridging countless important concepts with the knowledge I already had, giving me brand new insights as well as reinforcing some understanding I had prior to reading this book, I would most certainly recommend this book to any of those who're seeking to further their own understanding of networking, and learn what the foundations of the internet are. Or even for those who don't have any prior experience or knowledge. This book adds extremely valuable and beneficial analogies that would allow an individual with absolutely no knowledge about computers to understand a key concept.

Overall the past few days I spent creating notes from this book and reading through its entirety has benefited me greatly and I will refer this to anyone who asks me "Where should I start networking."

- BlackWolf
8.5/10

Comments