Futaba _ Webs ๐Ÿ•ธ๐Ÿ•ธ๐ŸŽƒ๐Ÿ•ธ๐Ÿ•ธ

Subnetting For Dummies ๐Ÿ•ธ๐Ÿ•ธ๐ŸŽƒ๐Ÿ•ธ๐Ÿ•ธ

Todayโ€™s article is gonna be an interesting one, where I cover one of the most complicated topics CRUCIAL to ETHICAL Cyber Security practices.โ€ฆ SUBNETTING!!!!

๐ŸŽƒ Article ๐ŸŽƒ Glossary ๐ŸŽƒ Catalog ๐ŸŽƒ Home ๐ŸŽƒ Search Mode

๐ŸŽƒ Article Glossary

๐Ÿ•ธ Synopsis ๐Ÿ•ธ

Todayโ€™s article is gonna be an interesting one, where I cover one of the most complicated topics CRUCIAL to ETHICAL Cyber Security practices.โ€ฆ SUBNETTING!!!!

You seeโ€ฆ subnetting is NOT hard. Itโ€™s rather simple. The PROBLEM, like all things, is that people, REALLY intelligent people, lack the proper soft skills to explain it correctly to you.

Over the course of this article Iโ€™m going to use non-conventional and more fun ways to properly break down subnetting to you so it โ€œclicksโ€.

It is ESSENTIAL that you UNDERSTAND subnetting as it also comes into play for offensive security when you have to navigate and find all the subnets that exist on a network to see where you can extend your attack surface. I am EXCEPTIONAL at this, as I not only have a full understanding of how subnetting and IP ranges work, BUT, I can โ€œvisualizeโ€ where I am, as well as make EFFECTIVE usage of basic commands that are commonly overlooked that TELL you how many subnets you have.



๐Ÿ•ธ Article Topics ๐Ÿ•ธ

I'll be discussing the following topics in order:

๐ŸŽƒ What is Subnetting?

๐ŸŽƒ Applying It To Cyber Security?

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

๐Ÿ•ธ Key Links ๐Ÿ•ธ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

๐ŸŽƒ LinkedIn Version

๐ŸŽƒ Subnetting For Dummies

What is Subnetting? ๐Ÿ•ธ๐Ÿ•ธ๐ŸŽƒ๐Ÿ•ธ๐Ÿ•ธ

Subnetting is the art of โ€œsplittingโ€ a network into โ€œsubnetworksโ€, which is a network of networks.

Hereโ€™s a diagram in order to better visualize it.

portfolio img

The top of the tree is the โ€œcoreโ€ network, the main AP that serves as the โ€œexit nodeโ€ or default gateway which is where all network traffic is routed to and from the network.

The sub trees that you see below are the โ€œsubnetsโ€. Ignore the ones below the subnets for now as thatโ€™s a bit complicated like explaining recursion. The goal is to keep it simple so you can follow along!

Subnets have what is known as a โ€œsubnet maskโ€, the โ€œ/24โ€ that you see commonly attached to a subnet IP address.

Ex: โ€œ192.168.1.1/24โ€

By default, this is the standard subnet mask that is usually assigned to you on a network.

If you apply subnetting you might see stuff like

๐ŸŽƒ โ€œ192.168.1.1/23โ€

๐ŸŽƒ โ€œ192.168.1.1/22โ€

๐ŸŽƒ โ€œ192.168.1.1/21โ€

And so forth. HOWEVER, be mindful THEY ARE NOT THE SAME SUBNET! The โ€œsubnet maskโ€ is there to tell you which subnet a system belongs to on a network. Of course, many have differentiating IP addresses to tell the apart for simplicity's sake. It can vary.

You also have stuff like โ€œIP Addresses Classesโ€, Class A, Class B, Class C, etc.

โ€œOH MY GOD THATโ€™S SOOOO COMPLICATEDโ€ Nahh, not really haha. Classes define the โ€œrange poolโ€ of IP addresses that you have available to dish out to systems on the network.

For example, IP Ranges that might look like

โ€œ192.168.1.0-255โ€ indicate there is an available pool of 255 IP addresses, the final number being reserved for what is known as the โ€œbroadcast addressโ€ that is used to echo messages to all systems on the network should you choose to do so, and of course, the first one, which is reserved for the default gateway. You can of course configure these however you like, but itโ€™s kept default for simplicity's sake.




How Does Subnetting Apply To Cyber Security? ๐Ÿ•ธ๐Ÿ•ธ๐ŸŽƒ๐Ÿ•ธ๐Ÿ•ธ

The goal of subnetting is to obfuscate your defenses and avoid what is known as a โ€œmonolithic structureโ€, borrowed from the concept of containers which condense all dependencies for software into one โ€œcontainerโ€. For Software engineering, this is good practice. HOWEVER, for Cyber Security, this is BAD practice.

When you condense EVERYTHING into one place, you not only create, become a single point of failure, where should an attacker, such as myself, breach your internal network, EVERYTHING is compromised. Imagine I attack one system, and EVERYTHING goes down with it.

Wiggles My Finger at you Like Sonic The HedgeHog

THATโ€™S NO GOOD!!!!!

portfolio img


- The Hacker Who Laughs ๐Ÿ•ธ๐Ÿ•ธ๐ŸŽƒ๐Ÿ•ธ๐Ÿ•ธ

portfolio img

๐ŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States