Articles News Reviews Releases Downloads Contact Us White Papers

Network Protocol Stack and TCP hacking


The network protocol stack, which forms the carrier and pipeline of data from one host to another is designed in such a way that we can interact with different layers at desired level. This article is a small attempt to describe the movement of data through these stacked layers and at the end we will try to implement a linux kernel module which helps us to capture the data flowing out to TCP layer and display it. I think to talk about all those really basic network communication is not necessary here. So I will straight away talk about the implementation of TCP/IP communication.

Network devices form the bottom layer of the protocol stack. they use a link layer protocol (usually Ethernet) to communicate with other devices to send and receive traffic. The interface put up by the network device driver copy packets from a physical medium, perform some error checks,Then puts up the packet to the network layer. Output interfaces receive packets from the network layer, perform some error checks, and then send them out over the physical medium. Here we shall talk about the IP which is the standard standard network layer protocol. The main functionality of IP is routing , it checks incoming packets to see if they are for the host computer or if they need to be forwarded. It defragments packets if necessary and delivers them to the transport protocols. It has a dynamic database of routes for outgoing packets; it addresses and fragments them if necessary before sending them down to the link layer.

Read Full Story


News
Google Spreadsheets: Secure Enough to Trust?
Jun 21, 2006, 14:32 EST
Microsoft exposed to second zero-day vulnerability
Jun 21, 2006, 13:03 EST
Wireless Security on the Road Without a VPN
Jun 21, 2006, 12:56 EST
ISPs Failing to Quickly Tackle Bot Menace
Jun 21, 2006, 12:56 EST
Want to outwit hackers? Hire an ethical one
Jun 21, 2006, 12:49 EST
Caller ID Spoofing
Jun 21, 2006, 12:48 EST
Red Hat Announces Oval Security Compatibility
Jun 21, 2006, 12:46 EST




Site Meter