Networking fundamentals

sreekrishnasreekrishna
5 min read

Task - 1:

introductory networking:

🔹 Key Topics Covered in the Room

  1. IP Addresses & How They Work IPv4 vs. IPv6 – Why the world is slowly shifting to IPv6 (more addresses!).
  • Public vs. Private IPs – How your home router uses NAT to share one public IP.
  1. DNS: The Internet’s Phonebook How your computer finds websites by converting domain names (like google.com) to IPs.
  • The role of recursive DNS resolvers (like Cloudflare or Google DNS).
  1. Packets & Protocols TCP vs. UDP – Reliable connections (TCP) vs. fast, connectionless data (UDP).
  • Three-Way Handshake – How devices establish a TCP connection (SYN > SYN-ACK > ACK).
  1. Subnetting Basics Breaking large networks into smaller subnets for efficiency.
  • Understanding CIDR notation (e.g., 192.168.1.0/24).
  1. Common Networking Tools ping – Check if a host is online.
  • traceroute/tracert – See the path your traffic takes.

  • nslookup/dig – Query DNS records manually.

Task -2:

Networking Concepts:

Networking can seem complicated, but TryHackMe’s Networking Concepts room breaks it down into simple, bite-sized lessons. Whether you're a complete beginner or just need a refresher, this room is a great way to learn.

🌐 What You’ll Learn:

  1. IP Addresses: The Internet’s Home Addresses Think of an IP address like your home address—it tells data where to go.

IPv4 (e.g., 192.168.1.1) vs. IPv6 (e.g., 2001:0db8:85a3::8a2e:0370:7334).

  1. DHCP: Automatic IP Assigner Your router uses DHCP to give your devices an IP automatically—no manual setup needed!

  2. Subnetting: Dividing Big Networks Splits large networks into smaller parts (like neighborhoods in a city).

Example: 192.168.1.0/24 means 254 usable IPs in that network.

  1. DNS: The Internet’s Phonebook Converts google.com

    → 142.250.190.46 so your browser can load websites.

  2. NAT: Sharing One Public IP

    • Your home router uses NAT to let multiple devices share one internet connection.

Task - 3:

HTTP in Detail

🌐 What is HTTP?

  • HTTP is how your computer asks for websites and gets replies. It's like ordering pizza:

  • You ask for pizza (request)

  • The restaurant replies (response)

  • You get your pizza (website loads)

📦 What You'll Learn

  1. Browser Requests GET = "Can I see this page?"

POST = "Here's my login info"

  1. Website Replies 200 = "Here's your page!"

404 = "Page not found"

500 = "We messed up"

  1. Extra Info (Headers) Like special delivery instructions:
  • Who's asking (your browser)

  • What language you prefer

  1. HTTPS = Safe Mode Locks your data so hackers can't see it

Look for 🔒 in your browser

🎮 What You'll Do See hidden website messages

Watch how logins work

Learn why some sites are safer

Task - 4:

DNS in detail

Introduction The Domain Name System (DNS) is the backbone of internet navigation, silently translating human-friendly domain names (like example.com) into machine-readable IP addresses. This system ensures seamless connectivity across global networks without requiring users to memorize complex numerical identifiers.

Core DNS Concepts:

  1. How DNS Resolution Works

  • When you enter a URL, your device initiates a multi-step lookup process:

  • Query Submission – Your request reaches a recursive resolver (often your ISP or public DNS like Google's 8.8.8.8).

  • Root Server Referral – The resolver contacts a root nameserver, which directs it to the appropriate Top-Level Domain (TLD) server (.com, .org, etc.).

  • Authoritative Response – The TLD server points to the domain's authoritative nameserver, which finally provides the correct IP address.

  • This entire process typically completes in milliseconds, thanks to caching at various levels.

  1. Key DNS Components Recursive Resolvers:

  • Handle client requests by traversing the DNS hierarchy.
  • Authoritative Nameservers: Store and provide definitive answers for specific domains.

  • DNS Caching: Temporarily stores recent lookups to improve performance.

  1. Security Implications DNS plays a critical role in cybersecurity:

  • DNS Hijacking: Malicious actors redirect traffic by corrupting DNS responses.

  • DNSSEC: A suite of extensions that authenticate DNS data to prevent spoofing.

  • DDoS Attacks: DNS infrastructure is a common target due to its centralized nature.

Task - 5:

How Websites Work

The Foundation of Web Communication Every website visit involves a sophisticated interaction between clients and servers. When you enter a URL, your browser initiates a complex sequence of events that delivers the requested content to your screen in seconds.

Key Components of Web Architecture

  1. Client-Server Model

Your browser (client) sends requests

Web servers process and respond

This exchange follows HTTP/HTTPS protocols

  1. Domain Resolution

DNS translates human-readable domains to IP addresses

Enables global accessibility without memorizing numbers

  1. Protocol Layers

TCP ensures reliable data delivery

HTTP structures content requests

TLS encrypts sensitive communications

  1. The Page Loading Process DNS Lookup

Converts domain names to server locations

Involves recursive queries through DNS hierarchy

  1. TCP Handshake

Three-way SYN-SYN/ACK-ACK sequence

Establishes stable connection channel

HTTPS Encryption

TLS negotiation secures the connection

Certificates verify server authenticity

  1. Resource Fetching

HTML documents provide structural blueprint

CSS and JavaScript enhance presentation

Media assets complete the visual experience

Task -6

Networking is the backbone of cybersecurity and IT. Whether you're starting your career or looking to strengthen your fundamentals, Hack The Box Academy's Network Foundations course provides a clear, hands-on introduction to essential concepts.

Key Takeaways from the Course:

🔹 Networking Basics – Learn the OSI model, TCP/IP, and how data travels across networks.

🔹 IP Addressing & Subnetting – Master IPv4, IPv6, and subnetting techniques.

🔹 Key Protocols – Understand DNS, DHCP, HTTP, FTP, and their security implications.

🔹 Network Devices – Explore routers, switches, and firewalls in real-world scenarios.

🔹 Security Risks – Discover common threats like MITM attacks and how to defend against them.

0
Subscribe to my newsletter

Read articles from sreekrishna directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

sreekrishna
sreekrishna