Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security Fundamentals
    • Security Principles
    • Information Security
  • Hacking
    • Reconnaissance
      • Footprinting
      • Scanning
      • Enumeration
      • Vulnerability Analysis
    • Privilege Escalation
    • Ethical Hacking
  • Governance, Risk And Compliance (GRC)
    • Risk Management
  • Security Architecture And Engineering
    • Cryptography
    • Identity Access Management
  • Security Operations
    • Security Assessment
      • Vulnerability Management
        • Threat Intelligence
    • Intrusion Detection And Prevention
  • Cyber Security Attacks and Threats
    • DoS
    • Password Hacking
    • Web Attacks
    • Web Applications Attacks
    • WI-FI Wireless Attacks
    • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Networking Protocols

HTTP

Posted on by

HTTP (Hypertext Transfer Protocol) is an application layer protocol which is the foundation of World Wide Web used for accessing and sharing information across Internet. Internet is a collection of Networks that was built to distribute and access information. Many application protocols are used in the Internet for distributing Information out of which HTTP is the…

Read more

TCP 3-Way Handshake

Posted on by

TCP is the primary transport layer protocol that is used to transport data between systems when communicating over a network. TCP is a connection oriented protocol that provides reliability, flow control, congestion control and multiplexing. TCP establishes a connection between the systems when they want to send data with a 3-way handshake. The client starts…

Read more

Domain Name Service (DNS)

Posted on by

Domain Name Service (DNS) provides naming service for computers and services. It has a database of mappings of hostnames to IP addresses. Client which wants to access target services on a server, connects to the hostnames. To resolve the hostname, the client send requests to the DNS server and gets the IP address. Using the…

Read more

Dynamic Host Control Protocol (DHCP)

Posted on by

Dynamic Host Control Protocol (DHCP) is a network management protocol that is used in IP network to assign IP addressed to nodes connected to the network automatically. DHCP is described in RFC 2131. In 1980s, there was Diskless Workstations which did not have disk with basic memory that used network booting. Since it has very…

Read more

Bootstrap Protocol (BOOTP)

Posted on by

Bootstrap Protocol (BOOTP) is Networking Protocol that is used to assign dynamic IP address to workstations. BOOTP replaced RARP which has limitations of sending additional network configuration data apart from IP address and couldn’t operate across subnets as it’s OSI Layer 2 based protocol. BOOTP operates at L4 of OSI Layer and uses UDP to…

Read more

MAC (Medium Access Control) Address

Posted on by

MAC (Medium Access Control) Address is unique identifier hardware address assigned to Network Interface Card (NIC) of any computing node. All computing nodes need a layer 2 hardware address for transmitting data which happens at Data Link Layer (Layer 2) and Physical Layer (Layer 1) of the OSI layer. When transmitting data on the LAN,…

Read more

IEEE 802

Posted on by

IEEE 802 is a networking standard developed and maintained by LAN/MAN Standards Committee (LMSC) for Local Area Network (LAN), Personal Area Network (PAN) and Metropolitan Area Network (MAN). IEEE 802 recommends best practices using an open and accredited process for Wired LAN, Wireless LAN, Wireless PAN, Wireless MAN.

Read more

Kerberos

Posted on by

Kerberos is a network authentication protocol developed by Massachusetts Institute of Technology that provides strong authentication between client and server using cryptography in an open unprotected network. Key Aspects of Kerberos Architecture Key Distribution Center (KDC) is the core component of Kerberos which acts as the 3rd Party Authentication providing Central Authentication to the domain (realm)…

Read more

Link-Local Multicast Name Resolution (LLMNR)

Posted on by

Link-Local Multicast Name Resolution (LLMNR) is a Network Protocol that is used for Name resolution based on DNS packet format operating in Layer 2 (local link) specified in RFC 4795. It is a fall-back mechanism when DNS fails. The system which needs to resolve a hostname will send out a multicast query using LLMNR and the…

Read more

Simple Network Management Protocol (SNMP)

Posted on by

SNMP is a protocol that is used to manage and monitor devices in IP based networks. It is used for Network Management and Network Monitoring. It collects information about the devices in a hierarchical structured way using Management Information Base (MIB). SNMP consists of the three following components: Managed Devices are the devices like server,…

Read more
  • 1
  • 2
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme