Page 764 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 764

Protocol Discovery


                  Hundreds of protocols are in use on a typical TCP/IP network at
                  any given moment. Using a sniffer, you can discover what
                  protocols are in use on your current network. Before using a

                  sniffer, though, make sure you have the proper permission or
                  authorization. Without approval, using a sniffer can be considered
                  a security violation because it enables you to eavesdrop on
                  unprotected network communications. If you can’t obtain
                  permission at work, try this on your home network instead.
                  Download and install a sniffer, such as Wireshark. Then use the
                  sniffer to monitor the activity on your network. Discover just how

                  many protocols (in other words, subprotocols of TCP/IP) are in use
                  on your network.

                  Another step in using a sniffer is to analyze the contents of
                  captured packets. Pick out a few different protocol packets and
                  inspect their headers. Look for TCP, ICMP, ARP, and UDP packets.
                  Compare the contents of their headers. Try to locate any special
                  flags or field codes used by the protocols. You’ll likely discover that

                  there is a lot more going on within a protocol than you ever
                  imagined.

                  If performing packet capturing is a task that you are unable to
                  accomplish or should not (due to rules, regulations, policies, laws,
                  etc.), then consider perusing the samples provided by Wireshark at
                  https://wiki.wireshark.org/SampleCaptures.



               User Datagram Protocol (UDP) also operates at layer 4 (the Transport
               layer) of the OSI model. It is a connectionless “best-effort”

               communications protocol. It offers no error detection or correction,
               does not use sequencing, does not use flow control mechanisms, does
               not use a preestablished session, and is considered unreliable. UDP
               has very low overhead and thus can transmit data quickly. However,
               UDP should be used only when the delivery of data is not essential.
   759   760   761   762   763   764   765   766   767   768   769