2 minute read

1. The Big Picture: Internet vs. The Web

Most people use these terms interchangeably, but in the world of Cyber Security, precision is key.

How the Internet Works

The Internet is the physical infrastructure—the “Network of Networks.” It consists of hardware like routers, switches, and fiber-optic cables. It uses IP Addresses to route small chunks of data called Packets from one point to another.

How the Web Works (WWW)

The World Wide Web is a service that runs on top of the internet. It uses the HTTP protocol to transmit documents (HTML, CSS, images). If the Internet is the highway, the Web is one specific type of truck driving on it.

The Client-Server Model

This is the basic interaction of the web:

  • The Client: The requester (your browser, a mobile app, or a CLI tool like curl).
  • The Server: A powerful computer that “serves” the requested data.

The Client-Server Model


2. HTTP Crash Course

HyperText Transfer Protocol (HTTP) is the language of the web. It operates on the Application Layer.

Key HTTP Methods

  • GET: Retrieve data from a server (viewing a page).
  • POST: Send data to a server (logging in, uploading a file).
  • PUT/PATCH: Update existing data on the server.
  • DELETE: Remove data from the server.

Important Status Codes

  • 200 OK: Success.
  • 301/302: Redirects.
  • 401/403: Unauthorized or Forbidden.
  • 404: Not Found.
  • 500: Internal Server Error.

3. Networking Models: OSI vs. TCP/IP

To standardize communication, we use layered models.

Layer OSI Model (Conceptual) TCP/IP Model (Practical)
7 Application Application
6 Presentation Application
5 Session Application
4 Transport Transport
3 Network Internet
2 Data Link Network Access
1 Physical Network Access

Image comparing the OSI Model and the TCP/IP Model


4. The Transport Layer: TCP, UDP, & ICMP

TCP (Transmission Control Protocol)

TCP is “connection-oriented” and reliable. It ensures data arrives intact and in order via the Three-Way Handshake:

  1. SYN: “Let’s synchronize.”
  2. SYN-ACK: “Acknowledged, let’s sync.”
  3. ACK: “Acknowledged, starting data transfer.”

UDP (User Datagram Protocol)

UDP is “connectionless.” It sends data without checking if it arrived. It’s much faster but unreliable.

  • Use Cases: Gaming, Streaming, DNS.

ICMP (Internet Control Message Protocol)

ICMP is used for diagnostic and error messages. It doesn’t carry user data. The ping command is the most common use of ICMP.


5. Protocols: SSH, Telnet, & FTP

Protocol Port Security Description
SSH 22 ✅ High Secure Shell. Encrypted remote terminal access.
Telnet 23 ❌ Zero Unencrypted remote access. Highly insecure.
FTP 21 ❌ Low File Transfer Protocol. Sends credentials in plaintext.

6. Essential Network Tools

Ping

Checks if a host is reachable and measures latency (round-trip time).

ping <IP_or_Domain>

Traceroute

Maps the path packets take to reach a destination, showing every router (hop) along the way.

traceroute <IP_or_Domain>

Nmap (Network Mapper)

The gold standard for reconnaissance. It discovers hosts, open ports, and services.

  • Service Scan: nmap -sV <target>
  • Default Scripts: nmap -sC <target>

0xaskar’s Summary

Understanding these fundamentals is the difference between a “Script Kiddie” and a professional security analyst. Always start with the basics:

  1. Is the host alive? (Ping)
  2. What ports are open? (Nmap)
  3. What protocol is it using? (HTTP/SSH/FTP)