eJPT Junior Penetration Tester
ShopAuthorPatreonHTB Pro Labs
eJPT Junior Penetration Tester
eJPT Junior Penetration Tester
  • 🍕eJPT Study Notes
  • Author
  • eCPPTv2 Study Notes
  • INE eJPT Exam
    • Description
    • eJPT Certification
  • RFS Tips
    • Before the Exam
    • Prepare your Setup
    • Questions?
    • Start Hacking
  • Methodology
    • 1️⃣To Scan a Network
    • 2️⃣To Attack a Linux Machine
    • 3️⃣To Attack a Windows Machine
    • 4️⃣Pivoting Methodology
    • 5️⃣Linux Post Exploitation
    • 6️⃣Windows Post Exploitation
  • Community
    • LinkedIn
    • Discord
  • Networking
    • 🟢OSI Layers
    • 🟢Protocols
    • 🟢Subnetting
    • 🟢Routing
    • Pivoting
  • Network Protocols
    • 🟢FTP 21
    • 🟢SSH 22
    • ✅HTTP 80
    • 🟢NetBIOS 139
    • 🟠SMB 445
    • MySQL 3306
    • 🟢RDP 3389
  • Web Attacks
    • XSS
    • SQLi
    • Path Traversal
    • Command Injection
    • LFI - Local File Inclusion
    • LFI cheatsheet - HTB
  • Web CMS Attacks
    • Wordpress
    • Joomla
    • TomCat
  • Exploits
    • Search Exploits
    • Linux
    • Windows
  • Tools
    • dirb
    • 🟢Gobuster
    • Nmap
    • Netcat
    • Burpsuite
    • 🟢SQLMap
    • 🟢Metasploit
    • Hydra
    • 🟢John the Ripper
    • Hashcat
  • Web Tools
    • 😍RevShells
    • MD5 Crack
    • CyberChef
    • SecLists
  • TryHackMe Rooms
    • DogCat
    • Archangel
    • OWASP Juice Shop
  • Hack The Box Rooms
    • Page 2
  • Create Your Own Lab
    • Page 3
  • Other Resources
    • Page 1
  • TCM Security Courses
    • Page 4
Powered by GitBook
On this page
  • Physical Layer (Layer 1)
  • Data Link Layer (Layer 2)
  • Network Layer (Layer 3)
  • Transport Layer (Layer 4)
  • Session Layer (Layer 5)
  • Presentation Layer (Layer 6)
  • Application Layer (Layer 7)

Was this helpful?

  1. Networking

OSI Layers

Explore our detailed article on OSI Layers protocols tailored for pen-testers. Discover insights on vulnerabilities, security loopholes, and strategies for robust network defense.

PreviousWindows Post ExploitationNextProtocols

Last updated 1 year ago

Was this helpful?

Physical Layer (Layer 1)

Deals with the physical connection between devices, including the transmission and reception of raw bit streams over physical media such as cables or wireless.

Data Link Layer (Layer 2)

Responsible for creating a reliable link between two directly connected nodes, addressing errors in the physical layer and ensuring a consistent flow of data.

Network Layer (Layer 3)

Manages the routing of data packets between devices on different networks. It addresses logical addressing and determines the best path for data to reach its destination.

Transport Layer (Layer 4)

Ensures reliable data transfer between devices across a network. It handles end-to-end communication, error recovery, and flow control.

Session Layer (Layer 5)

Establishes, maintains, and terminates connections between applications. It manages sessions, allowing for data exchange and synchronization between applications on different devices.

Presentation Layer (Layer 6)

Handles data translation, encryption, and compression, ensuring that the data sent from the application layer of one system can be properly read by the application layer of another.

Application Layer (Layer 7)

Provides network services directly to end-users or applications. It enables communication between software applications, including functions like file transfers, email, and remote login.

🟢
Join the PopDocs.net Discord Server!Discord
Logo
OSI Model by Layers