HTB Intro to Networking – Log 01: The Overview


Introduction to Networking
🧠 What is a Network?
A network enables two or more computers to communicate with each other.
Key Components of a Network:
Topologies
Mesh
Tree
Star
Mediums
Ethernet
Fiber
Coax
Wireless
Protocols
TCP
UDP
IPX
💡 Why is Networking Important in Cybersecurity?
Because when a network fails, the error might be silent. Understanding how networks are structured and how data flows helps us spot problems and potential threats.
🏗️ Flat Network – The Basics
Creating a flat network isn’t difficult. But is it safe?
Yes — if we segment it properly.
By breaking it into smaller networks and setting up communication boundaries, we introduce layers of defense.
🛡️ Example 1:
Think of Access Control Lists (ACLs) like fences around smaller networks. They help in:
Detecting malicious activity
Limiting unauthorized access
🧾 Example 2:
Documenting the purpose of each network ensures visibility and accountability. Every packet should have a reason.
🚨 Example 3:
Using tools like Suricata or Snort — Intrusion Detection Systems (IDS) — deters network scans and raises alarms on shady behavior.
BASIC INFOMATION:
📦 How Networking Works (The Package Analogy)
A network is like a postal system. Data = packages.
Scenario:
You want to visit a company's website from your home network. Here's what happens behind the scenes:
You enter a website URL (e.g.,
www.subhisec.hashnode.dev
)This is called a Fully Qualified Domain Name (FQDN) — it’s like knowing the building address.
But a full URL (e.g.,
www.subhisec.hashnode.dev/example?floor=2&room=309
) gives:The floor
Office
Mailbox
Employee details
So, FQDN = the building
URL = full delivery address
🗺️ Who Delivers the Data?
You send the request (package) through:
Your Router (local post office)
It forwards to your ISP (main post office)
The ISP uses DNS (Domain Name Service) — like an address register — to get the real location (IP Address)
Your request is sent to the web server hosting the website
The server sends back the response (website data), which travels the same path back to you
Simple, right?
🚀 Wrap-Up
This is just the beginning. Understanding networking fundamentals is key for anyone getting into ethical hacking, cybersecurity, or CTFs.
Next up: IP Addressing, Ports, and Protocols.
Stay tuned for Log 02.
Subscribe to my newsletter
Read articles from Subhi Jose directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
