To access material, start machines and answer questions login.
This room introduces several protocols commonly used across networks:
These protocols form the foundation of how you browse the web, transfer files, and send and receive email. Understanding how they work at a low level is essential for anyone pursuing a career in cybersecurity, whether in penetration testing, network defence, or security engineering.
Each protocol task is designed to show what happens beneath the surface, which is usually hidden by a (Graphical User Interface). You will "talk" using the above protocols with a simple Telnet client to understand what your client is doing under the hood. The purpose is not to memorise the protocol commands but rather to observe the protocol while it is working.
Why Learn These Protocols Today?
You might wonder why you are studying protocols that are decades old. There are several important reasons.
First, these protocols are still in use. While most public-facing services now use encrypted versions (HTTPS, SFTP, IMAPS), the underlying protocol mechanics remain the same. The commands you send over HTTPS are the same commands, wrapped in encryption.
Second, you will encounter cleartext protocols during penetration tests and security assessments. Legacy systems, internal networks, devices, and misconfigured services often still use unencrypted protocols. Recognising and exploiting these weaknesses is a core penetration testing skill.
Third, understanding the protocol helps you understand the attacks. When you know how works, you understand why email spoofing is possible. When you understand , web application vulnerabilities make more sense. This foundational knowledge makes you a better security professional.
This room also discusses some of the insecurities inherent in these protocols. In particular, the focus is on passwords sent in cleartext. When credentials are transmitted without encryption, anyone with access to the network traffic can capture them. This was acceptable when these protocols were designed for trusted academic networks, but it is a serious vulnerability on modern networks.
In the follow-up room, Protocols and Servers 2, you will explore how these protocols can be secured using encryption, and examine attacks such as sniffing, man-in-the-middle, and password attacks in more detail.
Prerequisites
This room assumes a working understanding of /IP, ports, and the client-server model. You should also be comfortable with the terminal. If you need a refresher on any of these topics, complete the following first:
Ready to learn Cyber Security?
The Protocols and Servers room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
