ethical hacking

Different types of network protocols and their types – learn network protocol

Different types of network protocols and their types – learn network





Different types of network protocols

Having a solid introduction about network protocols is fundamental in the server exploitation phase; you just cannot attack a protocol without knowing how it works. I will not be explaining the ins and outs of every protocol because there are good resources available where you can learn about them, so I don’t need to reinvent the wheel. However, in this article ,i will teach you  brief introduction to network protocols. many penetration tester , most of the times, you would come across only three protocols[Different types of network protocols]

  • 1:-TCP (Transmission Control Protocol)
  •  2:- UDP (User Datagram Protocol)
  •  3:- ICMP (Internet Control Messaging Protocol)


Different types of network protocols

 what is Transmission Control Protocol 

75%of the Internet’s traffic is based upon TCP since it guarantees a reliable communication unlike UDP. Most of the protocols that we encounter in our daily lives are based upon TCP. Common examples are FTP, SMTP, Telnet, and HTTP. TCP is used whenever we need to perform a reliable communication between a client and a server. TCP performs a reliable communication via the three-way handshake.

Network Sniffing different types of sniffing attack [network sniffing]

 what is udp [User Datagram Protocol]

advantages of udp 

UDP is the exact opposite of TCP. It is used for faster communications.udp is used for video streaming, such as Skype or any live communication. The advantage of this protocol over TCP is that it’s much faster and efficient.

disadvantages of udp

The disadvantage of UDP is that it does not guarantee that the packet will reach the destination, since it does not perform the three-way handshake, thus causing reliability issues. Some of the common UDP protocols that we will run into as a penetration tester are DNS and SQL Server.

Different- types -of- network- protocols .png

what is icmp 

Internet Control Messaging Protocol ICMP runs upon layer 3 (network layer) of the OSI model, unlike TCP and UDP, which runs upon layer 4. The protocol was developed for troubleshooting error messages on a network. It is a connectionless protocol, which means that it gives us no guarantee that the packet will reach the destination. Common applications that use ICMP are Ping and Traceroute

Vulnerability Assessment Penetration Testing how to do with nmap

what is Server Protocols

In this module, we will be attacking server protocols, but as mentioned earlier, first we need to understand how they work.

server protocols are divided into two main categories:

1. Text-based protocols 

2. Binary protocols


Text-Based Protocols

 Text-based protocols are human readable protocols, and this is where you, as a penetration tester, need to spend most of your time as they are very easy to understand. Common examples of textbased protocols are HTTP, FTP, and SMTP. 

Learn Ethical Hacking Top best Tool for Learning Hacking

what is Binary Protocols 

Binary protocols are not human readable and are very difficult to understand; they are designed for efficiency across the wire. As a penetration tester, our primary focus would be on text/ASCIIbased protocols, not binary protocols.  talk about some of the popular text-based protocols such as FTP, HTTP, and SMTP.


i hope u will understand some network protocols




beef framework how to hack web browser using beef frame work




Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.