This technique sends packets to identify active systems and open ports on a network.
What is Scanning?
This protocol is responsible for determining how data travels between different networks on the Internet.
What is BGP (Border Gateway Protocol)?
Application, Presentation, Session
What is the 4th layer of the TCP/IP Protocol Stack
This command sends ICMP Echo Requests to test reachability and measure round-trip time.
What is PING?
These are used in SSL/TLS to provide a server’s public key to a browser.
What are digital certificates?
This protocol is used by ping to check if a host is alive and can be abused for reconnaissance.
What is ICMP? (Internet Control Message Protocol)
This is a collection of networks under one organization that shares a common routing policy and uses BGP to communicate with others.
What is an Autonomous System (AS)?
TCP/IP Protocol Stack layers 1 and 2
What is the Network Interface
This tool maps the path packets take by using increasing TTL values and ICMP Time Exceeded messages.
What is traceroute (or tracert)?
Browsers trust these entities to verify identities and sign certificates.
What are Certificate Authorities (CAs)?
This tool can perform port scanning, OS fingerprinting, and network mapping.
What is Nmap?
BGP chooses routes based on this factor, often preferring fewer hops between autonomous systems.
What is shortest path (AS path length)?
This type of address identifies a device across networks and is used by routers.
What is an IP address?
Your MAC address get used at this layer in the OSI Stack.
Layer 2 (Data Link – local network only)
This ensures that a certificate has not been altered and proves it was issued by a trusted authority.
What is a digital signature?
This attack tricks devices by sending fake MAC address mappings to redirect traffic.
What is ARP poisoning?
This fundamental weakness in BGP allows false routing information to spread globally.
What is lack of authentication / trust-based routing?
This process adds headers as data moves down the layers of the network stack.
What is encapsulation?
This device determines the best path for packets to travel between networks.
What is a router?
This attack occurs when an attacker presents a fake certificate to intercept communication.
What is a man-in-the-middle (middleperson) attack using a rogue certificate?
This attack sends small requests that trigger much larger responses to overwhelm a victim.
What is a DDoS amplification attack?
This attack occurs when an attacker falsely announces IP address ownership to redirect traffic to their network.
What is BGP route hijacking?
This process breaks data into smaller units and sends them across the network.
What is packetization (or data transmission using packets)?
Name the correct sequence: data is created, packaged with headers, sent across networks, and reconstructed at the destination.
Data Creation → Encapsulation → Transmission → Routing → Decapsulation
Infiltration, Aggregation, Exfiltration, and Persistence
What is the "anatomy of a hack"? Or the "cyber-criminal kill chain"