#

Extending Your Network

Task 1 Introduction to Port Forwarding

What is the name of the device that is used to configure port forwarding?

"router"

 

Task 2 Firewalls 101

What layers of the OSI model do firewalls operate at?

"Layer 3,Layer 4"

 
What category of firewall inspects the entire connection?

"stateful"

 
What category of firewall inspects individual packets?

"stateless"

 

Task 3 Practical – Firewall

 
 
What we need to do at this stage is to protect our website from attack.
For the filter, we choose our source as the attacker's IP address. (198.51.100.34)
As the target filter, we choose our device that is exposed to the attack. (203.0.110.1)
As for the port, we choose 80 as we know that it is the website that has been hacked.
As an action, we set it as "DROP" as we will not let it pass.
Then we get our flag!
What is the flag?

"THM{FIREWALLS_RULE}"

 

Task 4 VPN Basics

What VPN technology only encrypts & provides the authentication of data?

"PPP"

 
What VPN technology uses the IP framework?

"IPSec"

 

Task 5 LAN Networking Devices

What is the verb for the action that a router does?

"routing"

 
What are the two different layers of switches? Separate these by a comma I.e.: LayerX,LayerY

"Layer2,Layer3"

 

Task 6 Practical – Network Simulator

 
 
At this stage, as seen in the picture below, we enter the values requested from us and send a TCP packet to computer 3.
 
After sending our package, we get our flag.
 
Another question asked to us is the number of handshakes.
We can count these values in Network Log.
 
What is the flag from the network simulator?

"THM{YOU'VE_GOT_DATA}"

 
How many HANDSHAKE entries are there in the Network Log?

"5"