Copy Link
Add to Bookmark
Report

Hacking: TCP/IP

The last click Issue 1

eZine's profile picture
Published in 
the last click
 · 1 year ago

Given the importance of the internet in hacking, it can't hurt to understand a little about how it works. TCP/IP is most often used for process communication between a server and one (or more) clients. The different processes communicate through a protocol. Usually, several protocols are involved at different levels for the establishment of a communication.

Each protocol has a specific function (data addressing, error checking, data validity checking, etc.).

TCP/IP is the abbreviation for Transmission protocol Control/Internet Protocol. TCP/IP is a set of protocols and sub-protocols organized in layers (hence the name TCP/IP stack).

TCP is one protocol and IP is another. These are the most important ones, but there are many others grouped under the name TCP/IP.

The layers of TCP/IP are not well defined, but we can distinguish 4 main ones:

  • The network layer which allows access to a network by managing the network cards and the connection protocols (e.g. the Point to Point Protocol -PPP- used for connections on the Common Telephone Network -RTC- by modem).
  • The Internet layer which allows the addressing of machines by the IP protocol (IP addresses) on a local network or public network.
  • The transport layer which allows the routing of data, the protocols used are TCP and UDP, many machine ports use UDP, but UDP is less reliable than TCP because it does not check the reception.
  • The application layer uses the largest number of protocols (see table below).

Sometimes data is partially lost or damaged. However, errors can be detected and the transmission is reset by the server.


TCP uses flow control and sends data in packets with several layers of information (envelopes, etc.). Pinging consists of sending packets of a certain size and determines the response time of the remote computer.

Here is a table of the main ports used in TCP/IP.

TCP/IP ports.
Pin it
TCP/IP ports.

The Internet is therefore largely based on TCP/IP, most of whose sub-protocols cannot be used directly by the user.

Well, I didn't say everything, but it's useless to fill your head. That should be enough for now. I'll talk about the different processes and functions of ports in the next issue.

-= Shin =-

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT