Network
1) HIDS vs NIDS
HIDS is host intrusion detection system - placed on each host
NIDS is network intrusion detection system - placed in the network
Both the systems work on the similar lines. It’s just that the placement in different.
For an enterprise, NIDS is preferred as HIDS is difficult to manage, plus it consumes processing power of the host as well.2) How does tracert/traceroute work? What protocol does it use?
In case you can’t ping the final destination, tracert will help to identify where the connection stops or gets broken, whether it is
firewall, ISP, router etc.
It actually keeps sending packets to the final destination; the only change is the TTL that’s used. The extra credit is the fact that
Windows uses ICMP by default while Linux uses UDP
The Time To Live (TTL) field in an IP header was intended to hold the number of seconds for which the IP packet is valid, after which
it can be dropped. In practice, it is used as a decrementing hop count, whereby every router that forwards the packet reduces the TTL
value by one.
IP Packet Headers: Source, Destination, TimetoLive (TTL)
When TTL=0, router sends a message says "I dropped the packets"Addresses
Hosts
Netmask
Amount of a Class C
/ 30
4
2
255.255.255.252
1 / 64
/ 29
8
6
255.255.255.248
1 / 32
/ 28
16
14
255.255.255.240
1 / 16
/ 27
32
30
255.255.255.224
1 / 8
/ 26
64
62
255.255.255.192
1 / 4
/ 25
128
126
255.255.255.128
1 / 2
/ 24
256
254
255.255.255.0
1
/ 23
512
510
255.255.254.0
2
/ 22
1024
1022
255.255.252.0
4
/ 21
2048
2046
255.255.248.0
8
/ 20
4096
4094
255.255.240.0
16
/ 19
8192
8190
255.255.224.0
32
/ 18
16384
16382
255.255.192.0
64
/ 17
32768
32766
255.255.128.0
128
/ 16
65536
65534
255.255.0.0
256
Last updated
Was this helpful?