HTB Intro to Networking – Log 01: The Overview

Subhi JoseSubhi Jose
2 min read

Introduction to Networking

🧠 What is a Network?

A network enables two or more computers to communicate with each other.

Key Components of a Network:

  • Topologies

    • Mesh

    • Tree

    • Star

  • Mediums

    • Ethernet

    • Fiber

    • Coax

    • Wireless

  • Protocols

    • TCP

    • UDP

    • IPX


💡 Why is Networking Important in Cybersecurity?

Because when a network fails, the error might be silent. Understanding how networks are structured and how data flows helps us spot problems and potential threats.


🏗️ Flat Network – The Basics

Creating a flat network isn’t difficult. But is it safe?

Yes — if we segment it properly.
By breaking it into smaller networks and setting up communication boundaries, we introduce layers of defense.

🛡️ Example 1:

Think of Access Control Lists (ACLs) like fences around smaller networks. They help in:

  • Detecting malicious activity

  • Limiting unauthorized access

🧾 Example 2:

Documenting the purpose of each network ensures visibility and accountability. Every packet should have a reason.

🚨 Example 3:

Using tools like Suricata or Snort — Intrusion Detection Systems (IDS) — deters network scans and raises alarms on shady behavior.

BASIC INFOMATION:


📦 How Networking Works (The Package Analogy)

A network is like a postal system. Data = packages.

Scenario:

You want to visit a company's website from your home network. Here's what happens behind the scenes:

So, FQDN = the building
URL = full delivery address


🗺️ Who Delivers the Data?

You send the request (package) through:

  1. Your Router (local post office)

  2. It forwards to your ISP (main post office)

  3. The ISP uses DNS (Domain Name Service) — like an address register — to get the real location (IP Address)

  4. Your request is sent to the web server hosting the website

  5. The server sends back the response (website data), which travels the same path back to you

Simple, right?


🚀 Wrap-Up

This is just the beginning. Understanding networking fundamentals is key for anyone getting into ethical hacking, cybersecurity, or CTFs.

Next up: IP Addressing, Ports, and Protocols.
Stay tuned for Log 02.

0
Subscribe to my newsletter

Read articles from Subhi Jose directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Subhi Jose
Subhi Jose