Todayโs article is gonna be an interesting one, where I cover one of the most complicated topics CRUCIAL to ETHICAL Cyber Security practices.โฆ SUBNETTING!!!!
๐ Article ๐ Glossary ๐ Catalog ๐ Home ๐ Search ModeTodayโs article is gonna be an interesting one, where I cover one of the most complicated topics CRUCIAL to ETHICAL Cyber Security practices.โฆ SUBNETTING!!!! You seeโฆ subnetting is NOT hard. Itโs rather simple. The PROBLEM, like all things, is that people, REALLY intelligent people, lack the proper soft skills to explain it correctly to you. Over the course of this article Iโm going to use non-conventional and more fun ways to properly break down subnetting to you so it โclicksโ. It is ESSENTIAL that you UNDERSTAND subnetting as it also comes into play for offensive security when you have to navigate and find all the subnets that exist on a network to see where you can extend your attack surface. I am EXCEPTIONAL at this, as I not only have a full understanding of how subnetting and IP ranges work, BUT, I can โvisualizeโ where I am, as well as make EFFECTIVE usage of basic commands that are commonly overlooked that TELL you how many subnets you have.
I'll be discussing the following topics in order: ๐ What is Subnetting? ๐ Applying It To Cyber Security? You can click on any of the topics to simply check that one out if it interests you! NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!
Here's a quick run down on all the main links that are in the article in case you want to check them out first. ๐ LinkedIn Version
Subnetting is the art of โsplittingโ a network into โsubnetworksโ, which is a network of networks.
Hereโs a diagram in order to better visualize it.
The top of the tree is the โcoreโ network, the main AP that serves as the โexit nodeโ or default gateway which is where all network traffic is routed to and from the network.
The sub trees that you see below are the โsubnetsโ. Ignore the ones below the subnets for now as thatโs a bit complicated like explaining recursion. The goal is to keep it simple so you can follow along!
Subnets have what is known as a โsubnet maskโ, the โ/24โ that you see commonly attached to a subnet IP address.
Ex: โ192.168.1.1/24โ
By default, this is the standard subnet mask that is usually assigned to you on a network.
If you apply subnetting you might see stuff like
๐ โ192.168.1.1/23โ
๐ โ192.168.1.1/22โ
๐ โ192.168.1.1/21โ
And so forth. HOWEVER, be mindful THEY ARE NOT THE SAME SUBNET! The โsubnet maskโ is there to tell you which subnet a system belongs to on a network. Of course, many have differentiating IP addresses to tell the apart for simplicity's sake. It can vary.
You also have stuff like โIP Addresses Classesโ, Class A, Class B, Class C, etc.
โOH MY GOD THATโS SOOOO COMPLICATEDโ Nahh, not really haha. Classes define the โrange poolโ of IP addresses that you have available to dish out to systems on the network.
For example, IP Ranges that might look like
โ192.168.1.0-255โ indicate there is an available pool of 255 IP addresses, the final number being reserved for what is known as the โbroadcast addressโ that is used to echo messages to all systems on the network should you choose to do so, and of course, the first one, which is reserved for the default gateway. You can of course configure these however you like, but itโs kept default for simplicity's sake.
The goal of subnetting is to obfuscate your defenses and avoid what is known as a โmonolithic structureโ, borrowed from the concept of containers which condense all dependencies for software into one โcontainerโ. For Software engineering, this is good practice. HOWEVER, for Cyber Security, this is BAD practice.
When you condense EVERYTHING into one place, you not only create, become a single point of failure, where should an attacker, such as myself, breach your internal network, EVERYTHING is compromised. Imagine I attack one system, and EVERYTHING goes down with it.
Wiggles My Finger at you Like Sonic The HedgeHog
THATโS NO GOOD!!!!!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ