02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

32 Chapter 2 ■ System Fundamentals<br />

Stuxnet<br />

A few years ago an interesting little worm named Stuxnet showed up on the<br />

scene—wreaking havoc and destroying industrial equipment. The operation of the virus<br />

isn’t important here; what is important is that this worm was not much of a traveler. It<br />

replicated itself via removable drives—that is, the physical layer!<br />

Layer 2: Data Link The data link layer works to ensure that the data it transfers is free<br />

of errors. At this layer, data is contained in frames. Functions such as media access control<br />

and link establishment occur at this layer. This layer encompasses basic protocols such as<br />

802.3 for Ethernet and 802.11 for Wi-Fi.<br />

Layer 3: Network The network layer determines the path of data packets based on different<br />

factors as defined by the protocol used. At this layer we see IP addressing for routing<br />

of data packets. This layer also includes routing protocols such as the Routing Information<br />

Protocol (RIP) and the Interior Gateway Routing Protocol (IGRP). This is the know-whereto-go<br />

layer.<br />

Layer 4: Transport The transport layer ensures the transport or sending of data is successful.<br />

This function can include error checking operations as well as working to keep data<br />

messages in sequence. At this layer we find the Transmission Control Protocol (TCP) and<br />

the User Datagram Protocol (UDP).<br />

Layer 5: Session The session layer identifies established system sessions between different<br />

network entities. When you access a system remotely, for example, you are creating<br />

a session between your computer and the remote system. The session layer monitors and<br />

controls such connections, allowing multiple, separate connections to different resources.<br />

Common use includes NetBIOS and RPC.<br />

As you progress through the chapters, you’ll notice that much of our attack<br />

surface resides within layers 3, 4, and 5, with a handful of other attacks<br />

taking place outside these layers. Keep this in mind as a reference for<br />

questions regarding attacks at specific layers or when trying to understand<br />

the mechanics of an attack and its defense. Understanding what the layer<br />

accomplishes can help you determine how a specific attack works and<br />

what it may be targeting.<br />

Layer 6: Presentation The presentation layer provides a translation of data that is understandable<br />

by the next receiving layer. Traffic flow is presented in a format that can be<br />

consumed by the receiver and can optionally be encrypted with protocols such as Secure<br />

Sockets Layer (SSL).<br />

Layer 7: Application The application layer functions as a user platform in which the user<br />

and the software processes within the system can operate and access network resources.<br />

Applications and software suites that we use on a daily basis are under this layer. Common<br />

examples include protocols we interact with on a daily basis, such as FTP and HTTP.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!