1) IP protocols: IPv4 and IPv6, TCP, UDP and ICMP.
1.1) IPv4 and IPv6
5. The Internet Protocol (IP) | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)
1.2) TCP
12. TCP: The Transmission Control Protocol (Preliminaries) | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)
1.3) UDP
10. User Datagram Protocol (UDP) and IP Fragmentation | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)
1.4) 8. ICMPv4 and ICMPv6: Internet Control Message Protocol | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)
2) Detailed knowledge of application layer protocols commonly used by Trojan malware, namely TCP, UDP, HTTP[S], SMTP, and DNS.
3) In-depth understanding of how the Internet (web browser/server architecture) and email systems function.
4) Fundamental knowledge of at least the following protocols; IRC, DHCP, FTP, SMB, SNMP, ICMP.
4.1) IRC
What is IRC? (csun.edu)
Internet Relay Chat (IRC) protocol with Wireshark - Infosec Resources (infosecinstitute.com)
IRC (Internet Relay Chat) Protocol Activity to the Internet | SIEM Guide [7.8] | Elastic
4.2) DHCP
6. System Configuration: DHCP and Autoconfiguration | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)
4.3)FTP
4.4) SMB
4.5) SNMP
4.6) ICMP.
8. ICMPv4 and ICMPv6: Internet Control Message Protocol | TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition (oreilly.com)
Comments
Post a Comment