Extending Your Network |TryHackMe | Writeup

Mohamed Ali
4 min readDec 29, 2024

--

Learn about some of the technologies used to extend networks out onto the Internet and the motivations for this.

For Quick Answer

Find This Room: Extending Your Network

https://getresponse.com?ab=jNdNKDQFn6

Welcome back amazing hackers, Today I’m with a cool article on Tryhackme writeup.

Introduction to port forwarding:

Port forwarding is a useful component meant for connecting applications and services to the internet. Take an example that server with an IP address “192.168.*.*” runs a port on port 80 along with two computers connected to it(intranet). Admin wanted to make the content visible to the public so he use the port forwarding concept to make it visible.

Question 1:

What is the name of the device that is used to configure port forwarding?

Ans: router

Firewalls 101:

A firewall is a device responsible for filtering traffic for whether to allow it or not. If the traffic is genuine firewall allowed those traffic otherwise deny it.

Filtering has been done in the following ways:

  1. Where the traffic is coming from?
  2. Where the traffic is going to?
  3. What port is the traffic for?
  4. What protocol is the traffic using for?

Two primary categories of firewall:

  1. Stateful — Uses the entire information from connection. It determines the entire behavior of connection instead of examing individual packets.
  2. Stateless — Inspecting individual packets whether acceptable or not by firewall.

Question 1:

What layers of the OSI model do firewalls operate at?

Layer3, Layer4

Question 2:

What category of firewall inspects the entire connection?

stateful

Question 3:

What category of firewall inspects individual packets?

stateless

Practical — Firewall:

Deploy the static site attached to this task. You must correctly configure the firewall to prevent the device from overloading to receive the flag!

By the above method, we can filter this filter malicious packet.

VPN basics:

VPN stands for Virtual Private Network is a technology that communicates over secure private network by creating dedicated path connection between each other via internet(tunnel).

Benefits of VPN :

  1. Allow networks in various geographical location to be connected.
  2. Generating privacy.
  3. Generating Anonymity.

Technology of VPN:

  1. PPP — It is used by PPTP to allow authentication and provide encryption of data.It is not capable of leaving network by itself.
  2. PPTP — It’s stands for Point to Point Tunnel Protocol that allows data from PPP to travel and leave the network. It is weakly encrypted.
  3. IPSec — Internet Protocol Security encrypts data using existing Internet protocol framework.

Question 1:

What VPN technology only encrypts & provides the authentication of data?

PPP

What VPN technology uses the IP framework?

IPSec

Router :

The main role of the router is to connect networks and pass the data between each other. The process of passing or traveling data are called routing. Routing is used to create a path between each other so that data successfully reached the destination.

Switch:

The switch is the dedicated network device used for connecting multiple devices. The switch uses ethernet cables for connecting multiple devices. It operates on layer 2 and layer 3 of OSI model.

Question 1:

What is the verb for the action that a router does?

routing

What are the two different layers of switches? Separate these by a comma I.e.: LayerX,LayerY

Layer2,Layer3

Practical Network Simulator:

In this task, you have to send the packets from computer 1 to computer 3 TCP packet type and last of the packet received you would notified popup with flag message.

Question 1:

What is the flag from the network simulator?

THM{YOU’VE_GOT_DATA}

How many HANDSHAKE entries are there in the Network Log?

5

Subscribe and follow for more writeup like this 😊

https://getresponse.com?ab=jNdNKDQFn6

--

--

Mohamed Ali
Mohamed Ali

Responses (1)