Network protocol stack and TCP hacking

Wednesday, 3 March 2004, 12:09 PM EST

The network protocol stack, which forms the carrier and pipeline of data from one host to another is designed in such a way that we can interact with different layers at desired level. This article is a small attempt to describe the movement of data through these stacked layers and at the end we will try to implement a linux kernel module which helps us to capture the data flowing out to TCP layer and display it. I think to talk about all those really basic network communication is not necessary here. So I will straight away talk about the implementation of TCP/IP communication.

Network devices form the bottom layer of the protocol stack. they use a link layer protocol (usually Ethernet) to communicate with other devices to send and receive traffic. The interface put up by the network device driver copy packets from a physical medium, perform some error checks,Then puts up the packet to the network layer. Output interfaces receive packets from the network layer, perform some error checks, and then send them out over the physical medium. Here we shall talk about the IP which is the standard standard network layer protocol. The main functionality of IP is routing , it checks incoming packets to see if they are for the host computer or if they need to be forwarded. It defragments packets if necessary and delivers them to the transport protocols. It has a dynamic database of routes for outgoing packets; it addresses and fragments them if necessary before sending them down to the link layer.

By shyamjith at Linux Gazette.

[ Read more ]

Related items




Spotlight

Internet Explorer vulnerabilities increase 100%

Posted on 23 July 2014.  |  Bromium Labs research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //