πŸ•ΉοΈ
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • πŸ—ƒοΈExam Prep Notes
    • πŸ“”CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • πŸ“˜ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • πŸ“—AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • πŸ“—SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • πŸ“”AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • πŸ§‘β€πŸ’»Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • πŸ•ΈοΈNetwork Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • πŸ§‘β€πŸ’»VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • β˜„οΈGRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • πŸ”Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • πŸ•ΉοΈServer are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • πŸ™β€β™‚οΈDan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • πŸ›‘οΈSecurity Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • IPV4 Address Classes
  • How to identify type of IP Address:
  • How to calculate Subnets:
  • Examples related to subnetting
  1. Cyber Security Base
  2. Network Security

IP Address and IP Subnetting

PreviousStrongSwan Gateway VPN Server on UbuntuNextBasic to Advance Networking Materials

Last updated 2 months ago


IPV4 Address Classes

IP CLASSES

Class A 1-126  They are used by very large companies such as google 
11111111 00000000 00000000 00000000

Class B 128-191 medium and large sized enterprises
11111111 11111111 00000000 00000000

Class C 192-232 General use
11111111 11111111 11111111 00000000

Class D 192-239 Research Purpouse / Multicast
Class E 240-254 Advance Research Purpouse

How to identify type of IP Address:

How to calculate Subnets:

Subnetting is the process of taking some of the hosts bits to the network bit to expand the network efficiently.

Network = 1
Hosts = 0
The standerd code of the IP classes look like
Class A : 11111111 00000000 00000000 00000000 
Class B : 11111111 11111111 00000000 00000000
Class C : 11111111 11111111 11111111 00000000

Take the following IP as Refrence

192.168.26.10
--> This is the Typical class C network
Thus it will be like
11111111 11111111 11111111 00000000


--> Take 192.168.26.10 If we have to expand the network bit we will change the binary
11111111 11111111 11111111 11|000000
It defines that we have taken 2 extra bits from the host

On the above example:
The subnetting has 4 diffrent parts : 
Subnet notation : 192.168.26.10/26 {/26 : it defines the total number of network bits}
Subnet mask: 255.255.255.192 {.192 AS (2^7)+(2^6)}
|||| OR OPREATION ||||||
0*0=0
0*1=0
1*0=0
1*1=1
|||| |||| |||| |||| ||||

Network ID : 192.168.29.0
{
Step 1: Convert the IP to binary (192.168.29.10)
Binary Address: 11000000 10101000 00011101 00001010
Notation:       11111111 11111111 11111111 00000000 {OR METHOD APPLIED}
____________________________________________________________
                11000000 10101000 00011101 00000000 --> 192.168.26.0 (Network ID)
}
Number of Subnets : which are added : 2^n {2^2=4}
Number of hosts : (Number of remaining hosts) 2^n-2{2^6-2=62}
Host Range (Derived): 192.168.26.0 .. 192.168.26.62
Broadcast IP : 192.168.26.63


---> Derived Subnets : 🎯
Host Range Subnet-1: 192.168.26.1    ..  192.168.26.62    BR : 192.168.26.63  
Host range Subnet-2: 192.168.26.65   ..  192.168.26.126   BR : 192.168.26.127
Host range Subnet-3: 192.168.26.129  ..  192.168.26.190   BR : 192.168.26.191
Host Range Subnet-4: 192.168.26.193  ..  192.168.26.254   BR : 192.168.26.255 

Examples related to subnetting

-->  IP Address : 192.168.112.0 |  Create 3 Extra Subnets
STEP 1: Subnet Notation : 192.168.112.0/27
STEP 2: Subnet mask : 11111111 11111111 11111111 111 00000 --> 192.168.29.224
STEP 3: {
Network ID : 192.168.112.0
//Calculation//
11000000 10101000 01110000 00000000
11111111 11111111 11111111 11100000
_________________________________________
11000000 10101000 01110000 00000000 --> 192.168.112.0
}
Number of Subnets : n=3 {2^n} = 2^3= 8
Number of hosts : n=5 (2^n-2)= 2^5-2=30
Host Range (derived): 192.168.112.0 .. 192.168.112.30
Broadcast IP : 192.168.112.31

|||||  Derived Subnets
Subnet 1 : 192.168.112.0 .. 192.168.112.30 | 192.168.112.31
Subnet 2 : 192.168.112.32 ..192.168.112.62 | 192.168.112.63
Subnet 3 : 192.168.112.64 .. 192.168.112.94 | 192.168.112.95
Subnet 4 : 192.168.112.96 .. 192.168.112.126 | 192.168.112.127
Subnet 5 : 192.168.112.128 .. 192.168.112.158 | 192.168.112.159
Subnet 6 : 192.168.112.160 .. 192.168.112.190 | 192.168.112.191
Subnet 7 : 192.168.112.192 .. 191.168.112.222 | 192.168.112.223
Subnet 8 : 192.168.112.224 .. 192.168.112.254 | 192.168.112.255

πŸ§‘β€πŸ’»
πŸ•ΈοΈ