The Network Protocol Cheatsheet: Riddhi Suryavanshi
The Network Protocol Cheatsheet: Riddhi Suryavanshi
CHEATSHEET
Riddhi Suryavanshi
1
University of Delhi, 2Lucideus Technologies
[email protected]
I. INTRODUCTION
This document is intended for students and security professionals as a quick reference for networking
protocols. It covers 50 protocols classified according to the OSI Layer they operate on. The
corresponding RFC has been provided to further check for parameters/commands of a particular
protocol. From security perspective, the corresponding attacks/vulnerabilities are also included in this
cheatsheet.
III. DEFINITIONS
[1] Protocol- A protocol is a standard set of rules that allow electronic devices to communicate with
each other.
[2] Port- A logical construct that identifies a specific process or a type of network service.
[3] RFC- A formal document from the Internet Engineering Task Force that is the result of committee
drafting and subsequent review by interested parties.
[4] OSI Layer- One of the seven layers of the Open Systems Interconnection Model that describes how
information from a software application in one computer moves through a physical medium to the
software application in another computer.
[5] Attack: An information security threat that involves an attempt to obtain, alter, destroy, remove,
implant or reveal information without authorized access or permission.
[6] Vulnerability: A flaw in a system that can leave it open to attack.
IV. ABBREVIATIONS
REFERENCES
[1] https://www.cvedetails.com/
[2] https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
[3] https://www.rfc-editor.org/
[4] https://resources.infosecinstitute.com/nat-pmp-vulnerability/#gref
[5] https://cve.mitre.org/
[6] https://www.f5.com/services/resources/white-papers/the-myth-of-network-address-translation-as-security
[7] https://www.infoworld.com/article/2942749/obsolete-internet-protocol-once-again-becomes-an-attack-vector.html
[8] https://www.geeksforgeeks.org/ip-security-ipsec/
[9] https://www.sciencedaily.com/releases/2018/08/180814134201.htm
[10] http://www.cis.syr.edu/~wedu/seed/Book/book_sample_tcp.pdf
[11] https://en.wikipedia.org/wiki/UDP_flood_attack
[12] https://www.techrepublic.com/blog/it-security/the-problem-with-netbios/
[13] https://www.netsparker.com/blog/web-security/xml-rpc-protocol-ip-disclosure-attacks/
[14] https://www.synopsys.com/blogs/software-security/attacks-on-tls-vulnerabilities/
[15] http://riseandhack.blogspot.com/2015/02/xml-injection-soap-injection-notes.html
[16] https://nvd.nist.gov/vuln/detail/CVE-2019-1660#vulnCurrentDescriptionTitle
[17] https://www.techopedia.com/definition/4539/simple-network-time-protocol-sntp
[18] https://beyondsecurity.com/scan-pentest-network-vulnerabilities-ldap-null-directory-bases.html?cn-reloaded=1