DEV Community

Cover image for Day 5: Networking Basics for Hackers — How the Internet Actually Works (2026)
Mr Elite
Mr Elite

Posted on • Originally published at securityelites.com

Day 5: Networking Basics for Hackers — How the Internet Actually Works (2026)

📰 Originally published on SecurityElites — the canonical, fully-updated version of this article.

Day 5: Networking Basics for Hackers — How the Internet Actually Works (2026)

DAY 5 OF 100
100-Day Ethical Hacking Course

Full Course →

🔴 Day 5 — Networking Basics for Hackers

Day 100 — Professional Pentester

← Day 4: Linux File System

Day 6: IP Addressing & Subnetting →

05

Every time you scan a target with Nmap, intercept a request with Burp Suite, or set up a listener for a reverse shell — you are working with networking concepts at a fundamental level. If you don’t understand what’s happening under the hood, you’re following instructions blindly. Blind instruction-following breaks down the moment something goes differently than expected.

Today we build your mental model of how networks work — from the physical cable all the way up to your browser. By the end of this lesson, when a packet travels from your Kali VM to a target machine, you’ll know exactly what’s happening at every step.

This lesson has a reputation for being dry. I’m going to make it the opposite. We’re going to trace a real connection — from you typing a URL in a browser to receiving the page — and explain every networking concept through that single journey. No abstract theory divorced from reality. Just the real thing, explained clearly.

📋 Day 5 Contents

  1. Why Networking Is Non-Negotiable
  2. The OSI Model — 7 Layers Explained
  3. TCP vs UDP — The Two Protocols
  4. IP Addresses — Public vs Private
  5. Ports — The Service Directory
  6. DNS — The Internet’s Phone Book
  7. ARP — How Devices Find Each Other
  8. HTTP vs HTTPS — Why It Matters
  9. Tracing a Full Packet Journey
  10. Day 5 Practical Task

Why Networking Is Non-Negotiable for Ethical Hackers

Here is the honest truth: almost every attack in ethical hacking is a networking operation. When you scan for open ports, you’re sending TCP packets and reading responses. When you intercept traffic with Burp Suite, you’re acting as a proxy in an HTTP conversation. When you set up a listener for a reverse shell, you’re opening a TCP socket and waiting for a connection. When you perform a man-in-the-middle attack, you’re manipulating ARP tables.

The students who struggle most in this field are the ones who skipped networking basics and jumped straight to tools. They can run Nmap but can’t explain what a SYN packet is. They can intercept HTTP with Burp but don’t know why HTTPS is different. Tools without understanding is a dead end — you hit the first unexpected result and have no idea why.

📡
Scanning
Nmap sends TCP/UDP packets and reads responses — pure networking

🔀
Interception
Burp Suite proxies HTTP — requires knowing how HTTP works

🐚
Shells
Reverse shells are TCP connections — socket, port, listener

🎭
MITM Attacks
ARP poisoning manipulates Layer 2 — needs ARP understanding

The OSI Model — 7 Layers That Explain Everything

The OSI (Open Systems Interconnection) model is a conceptual framework with 7 layers that describes how network communication works. Each layer has a specific job and communicates with the layers immediately above and below it. When data travels from your browser to a server, it passes through all 7 layers — twice.

I’m going to give you the hacker’s take on each layer — not a textbook definition, but what each layer means for the attacks and defences you’ll encounter over the next 95 days.

OSI Model — Hacker’s Edition

7
APPLICATION

Application Layer
Where user-facing apps communicate. Protocols: HTTP, HTTPS, FTP, SSH, DNS, SMTP. Hacker target: web vulnerabilities, credential theft, phishing.

6
PRESENTATION

Presentation Layer
Data translation, encryption, and compression. SSL/TLS lives here. Hacker angle: SSL stripping, downgrade attacks, certificate spoofing.

5
SESSION

Session Layer
Manages sessions between applications — start, maintain, end. Hacker angle: session hijacking, session fixation attacks.

4
TRANSPORT

Transport Layer
TCP and UDP live here — ports, reliable delivery, segmentation. Hacker angle: port scanning, SYN floods, TCP session attacks.

3
NETWORK

Network Layer
IP addressing and routing — getting packets to the right destination. Hacker angle: IP spoofing, ICMP attacks, routing manipulation.

2
DATA LINK

Data Link Layer
MAC addresses, frames, local network delivery. Switches operate here. Hacker angle: ARP poisoning, MAC spoofing, VLAN hopping.

1
PHYSICAL

Physical Layer
Actual cables, radio waves, electrical signals. Hardware. Hacker angle: wireless sniffing, physical access attacks, hardware implants.

Memory aid: “All People Seem To Need Data Processing” (Application → Physical, top to bottom)

💡 The hacker shortcut: In practice, most people work with a simplified 4-layer TCP/IP model (Application, Transport, Internet, Network Access) rather than all 7 OSI layers. But knowing the OSI model is essential for interviews, certifications, and understanding documentation. When someone says “Layer 3 attack” or “Layer 7 firewall” — now you know exactly what they mean.

TCP vs UDP — The Two Protocols Every Hacker Works With

At the Transport Layer (Layer 4), two protocols carry the vast majority of all internet traffic: TCP and UDP. Understanding the difference between them is not optional — Nmap’s scan types, reverse shell selection, and service fingerprinting all depend on it.


📖 Read the complete guide on SecurityElites

This article continues with deeper technical detail, screenshots, code samples, and an interactive lab walk-through. Read the full article on SecurityElites →


This article was originally written and published by the SecurityElites team. For more cybersecurity tutorials, ethical hacking guides, and CTF walk-throughs, visit SecurityElites.

Top comments (0)