Tuesday, 11 September 2018

TCP/IP

What is TCP/IP

tcp/ip is basically a set of rules/standards - see darpa standard
transmission control protocol/internet protocol
based on OSI model - but slightly different - 4 layers instead of 7

Image result for 4 layers of tcp/ip


tcp is essentially the transport layer  - responsible for splitting up the data and posting it on the physical link  - but like a clerk in an office getting lots of things ready to deliver to a customer - splitting it into manageable parcels - ip is like the postman - he picks up the parcels and routes them to their destination.

A TCP packet runs ontop of an IP packet.

TCP Packet:


enter image description here

IP packet:


Image result for ip packet

Three way handshake:

1. A tcp connection is established via a three way handshake - client sends a SYN (synchronize) packet to server with a random sequence number.

2. server sends back a SYN-ACK - containing another random sequence number and an ACK number to acknowledge clients sequence number

3. client then sends an ACK number to server, which aknowledges the servers sequence number.

now that the sequence numbers are synchronized, both ends can now send and receive data independently
Image result for three way handshake





1 comment:

  1. πŸŽ†THE HACK GEEKSπŸŽ†
    Have you ever wondered if it's possible to hack things the way hackers do it in the movies.πŸ€”πŸ€”

    Yeah its possible!!!😁😁😁
    "AS LONG AS IT'S TECHNOLOGY, IT CAN BE HACKED"

    Hacking can easily be done by planting a computer virus or spyware(depending on what the hacker intend to do) in the targeted device.🀐🀐

    We at THE HACK GEEKS give you the best hacking service there ever is.πŸ‘ŒπŸ‘Œ
    We understand the Issues of scammers all over the internet and that's why we give you a solid prove of our services.

    We have got the top hackers in hackerone.com that are always ready to hack for you anytime ,anywhere, any device, organisation, federal agencies, university, college you just think of it.
    We can help:
    *To Hack, Clone or Track a Phone?πŸ“±πŸ“²
    *To Sniff, Erase or Change a file in a Company, Organisation or in a Federal agency?πŸ“–πŸ“ƒ
    Eg: Changing of grades in a university.
    Changing of identity.
    Deleting of files such as criminal records and evidence.
    Changing of files and evidence in federal facilities.
    Stealing of files and document from companies and organizations.
    *To retrieve lost BitCoinπŸ’°πŸ’°
    *Mining of BitCoinπŸ’°πŸ’°
    *To hack an Email or any Social Media account?πŸ’ž
    *To Transfer funds without been detected?πŸ’΄πŸ’΅πŸ’·
    *To increase your credit score?πŸ”πŸ”
    *To Hack Credit/Debit card?πŸ’³πŸ’³

    All these are what we can do for you.

    We are descrete and won't expose our service to you to anyone.
    Contact:
    thehackgeeks@gmail.com
    We look forward to hacking for you.

    ReplyDelete

bash best practices

Bash best practices A few hints on bash best practice: * use #!/usr/bin/env bash .. this is more portable but you cant rely on a spe...