OSI Model থেকে WiFi Cracking পর্যন্ত — Network Security শেখার একমাত্র সম্পূর্ণ বাংলা রিসোর্স। এই গাইড পড়লে আর কোনো বই বা কোর্সের দরকার নেই। From OSI Model to WiFi Security — the only complete Bengali resource for Network Security. After reading this, no other book or course needed.
OSI (Open Systems Interconnection) Model হলো network communication-এর theoretical framework। প্রতিটা layer-এ আলাদা attack করা যায়। Security professional হিসেবে প্রতিটা layer জানা বাধ্যতামূলক।The OSI Model is the theoretical framework for network communication. Each layer can be attacked differently. Knowing every layer is mandatory as a security professional.
| Layer | Protocol | Port | কাজPurpose | Attack Vector |
|---|---|---|---|---|
| Application | HTTP | 80 | Web traffic | Sniffing, SQLi, XSS |
| Application | HTTPS | 443 | Encrypted web | SSL Strip, Cert spoof |
| Application | FTP | 21 | File transfer | Brute force, Sniff |
| Application | SSH | 22 | Secure shell | Brute force, Key theft |
| Application | Telnet | 23 | Remote shell (insecure) | Plaintext sniffing |
| Application | DNS | 53 | Name resolution | DNS Spoofing, Cache Poison |
| Application | SMTP | 25 | Email send | Relay abuse, Phishing |
| Application | SMB | 445 | File sharing (Windows) | EternalBlue, Pass-the-Hash |
| Application | RDP | 3389 | Remote Desktop | Brute force, BlueKeep |
| Transport | TCP | — | Reliable connection | SYN flood, RST inject |
| Transport | UDP | — | Fast, connectionless | UDP flood, Amplification |
| Network | ICMP | — | Ping, Error messages | Ping flood, Smurf attack |
| Network | ARP | — | IP→MAC resolution | ARP Spoofing (MITM) |
TCP connection এই 3-step process-এ establish হয়। Port scanner এবং firewall bypass বুঝতে এটা জানা অপরিহার্য।TCP connections are established via this 3-step process. Understanding this is essential for port scanners and firewall bypass.
Target-এ কোনো packet না পাঠিয়ে তথ্য সংগ্রহ। Target জানতে পারে না।Gather info without sending packets to target. Target doesn't know.
Target-এ packet পাঠিয়ে তথ্য সংগ্রহ। IDS/firewall log হতে পারে।Gather info by sending packets to target. IDS/firewall may log it.
| Standard | Name | Frequency | Max Speed | Range |
|---|---|---|---|---|
| 802.11b | WiFi 1 | 2.4 GHz | 11 Mbps | 35m indoor |
| 802.11a | WiFi 2 | 5 GHz | 54 Mbps | 35m indoor |
| 802.11g | WiFi 3 | 2.4 GHz | 54 Mbps | 38m indoor |
| 802.11n | WiFi 4 | 2.4/5 GHz | 600 Mbps | 70m indoor |
| 802.11ac | WiFi 5 | 5 GHz | 3.5 Gbps | 35m indoor |
| 802.11ax | WiFi 6 | 2.4/5/6 GHz | 9.6 Gbps | Indoor+outdoor |
WEP ছিল WiFi-এর প্রথম security standard (1997)। এটা RC4 cipher ব্যবহার করে কিন্তু IV (Initialization Vector) মাত্র 24-bit — ফলে same IV repeat হয় এবং পুরো encryption ভেঙে পড়ে।WEP was the first WiFi security standard (1997). It uses RC4 cipher but with only a 24-bit IV — causing IV repetition that breaks the entire encryption.
aircrack-ng — primary toolaireplay-ng — packet injectionairodump-ng — captureWPA (2003) WEP-এর জায়গায় এলো। TKIP (Temporal Key Integrity Protocol) ব্যবহার করে। প্রতিটা packet-এ আলাদা key generate হয়। কিন্তু এটাও WPA2 এর চেয়ে দুর্বল।WPA (2003) replaced WEP. Uses TKIP (Temporal Key Integrity Protocol). Generates a different key per packet. But still weaker than WPA2.
WPA2 (2004) সবচেয়ে বেশি ব্যবহৃত WiFi security protocol। AES-CCMP encryption ব্যবহার করে যা অনেক শক্তিশালী। Primary attack vector হলো 4-way handshake capture করে offline dictionary/brute force attack।WPA2 (2004) is the most widely used WiFi security protocol. Uses AES-CCMP encryption which is very strong. Primary attack vector is capturing the 4-way handshake for offline dictionary/brute force attack.
| Feature | WPA2 | WPA3 |
|---|---|---|
| Key Exchange | PSK (4-way handshake) | SAE (Dragonfly) — dictionary attack resist |
| Forward Secrecy | ❌ নেই | ✅ আছে — পুরানো traffic safe |
| Offline Dictionary Attack | ✅ সম্ভব | ❌ সম্ভব না (online only) |
| PMKID Attack | ✅ সম্ভব | ❌ সম্ভব না |
| Open Network Encryption | ❌ নেই | ✅ OWE (Opportunistic Wireless Encryption) |
| Enterprise Encryption | 128-bit | 192-bit (CNSA suite) |
| Known Weakness | Handshake crack | Dragonblood (side-channel, পুরানো impl.) |
WPS একটা সহজ connection mechanism — 8-digit PIN দিয়ে connect করা যায়। কিন্তু PIN দুই ভাগে verify হয় (4+4 digit), তাই মাত্র 11,000 combination try করলেই PIN বের করা যায়।WPS is a simple connection mechanism using an 8-digit PIN. But the PIN is verified in two halves (4+4 digits), so only ~11,000 combinations need to be tried to find the PIN.
Monitor Mode মানে wireless adapter সব packets capture করতে পারে — শুধু নিজের network না। এটা enable না করলে WiFi attack করা যায় না।Monitor Mode means the wireless adapter can capture all packets — not just your own network. WiFi attacks are impossible without enabling this.
Deauth attack-এ forged deauthentication frame পাঠিয়ে client-কে disconnect করা হয়। Client reconnect করার সময় 4-way handshake capture করা যায়।A deauth attack forces a client to disconnect by sending forged deauthentication frames. The 4-way handshake can be captured when the client reconnects.
Evil Twin মানে victim network-এর নামে একটা fake AP তৈরি করা। Victim connect করলে তার traffic আমাদের দিয়ে যাবে।Evil Twin means creating a fake AP with the same name as the victim's network. When the victim connects, their traffic flows through us.
| Tool | কাজPurpose | Command |
|---|---|---|
| airmon-ng | Monitor mode | airmon-ng start wlan0 |
| airodump-ng | Network scan ও capture | airodump-ng wlan0mon |
| aireplay-ng | Packet injection, deauth | aireplay-ng -0 5 -a BSSID wlan0mon |
| aircrack-ng | WEP/WPA crack (CPU) | aircrack-ng cap.cap -w wordlist |
| hashcat | WPA crack (GPU, fast) | hashcat -m 22000 hash rockyou.txt |
| hcxdumptool | PMKID capture | hcxdumptool -i wlan0mon -o out.pcapng |
| reaver | WPS PIN attack | reaver -i wlan0mon -b BSSID -vv |
| wash | WPS enabled AP খোঁজো | wash -i wlan0mon |
| wifite | Automated WiFi attack | wifite |
| fern-wifi-cracker | GUI WiFi cracker | fern-wifi-cracker |
Normal এ: Client → Router → Internet। MITM-এ: Client → Attacker → Router → Internet। Attacker মাঝখানে থেকে সব traffic দেখতে ও পরিবর্তন করতে পারে।Normally: Client → Router → Internet. With MITM: Client → Attacker → Router → Internet. The attacker in the middle can see and modify all traffic.
VPN encrypted tunnel তৈরি করে যার মধ্যে দিয়ে traffic যায়। ISP বা network admin traffic দেখতে পায় না। Security testing-এ নিজেকে anonymous রাখতে VPN জানা দরকার।A VPN creates an encrypted tunnel through which traffic passes. ISPs or network admins cannot see the traffic. Knowing VPNs is necessary for staying anonymous during security testing.
| Tool | Category | কাজ | Install |
|---|---|---|---|
| nmap | Scanning | Port scan, OS/service detect, NSE scripts | Pre-installed (Kali) |
| masscan | Scanning | Ultra-fast internet-wide scan | apt install masscan |
| netdiscover | Discovery | ARP-based host discovery | Pre-installed |
| wireshark | Analysis | GUI packet capture ও analysis | Pre-installed |
| tcpdump | Analysis | CLI packet capture | Pre-installed |
| aircrack-ng | Wireless | WEP/WPA crack suite | Pre-installed |
| hashcat | Password | GPU-based hash cracking | Pre-installed |
| hydra | Brute Force | Online network brute force | Pre-installed |
| bettercap | MITM | ARP spoof, MITM framework | apt install bettercap |
| metasploit | Exploitation | Exploit framework | Pre-installed |
| hcxdumptool | Wireless | PMKID/handshake capture | apt install hcxdumptool |
| reaver | Wireless | WPS PIN attack | Pre-installed |
| enum4linux | SMB | Windows/Samba enumeration | Pre-installed |
| crackmapexec | Windows | Windows network auditing | apt install crackmapexec |
| responder | Windows | LLMNR/NBT-NS poisoning | Pre-installed |
| snort | Defense | IDS/IPS | apt install snort |
| fail2ban | Defense | Brute force protection | apt install fail2ban |
| gobuster | Web/DNS | Directory ও DNS brute force | Pre-installed |
| wifite | Wireless | Automated WiFi attack tool | Pre-installed |
| proxychains | Anonymity | Tool-এর traffic proxy করো | Pre-installed |
| Platform | URL | ধরন | মূল্য |
|---|---|---|---|
| TryHackMe | tryhackme.com | Guided labs, Network rooms | Free + Premium |
| HackTheBox | hackthebox.com | Real machines, CTF | Free + VIP |
| VulnHub | vulnhub.com | VM download, offline | Free |
| PentesterLab | pentesterlab.com | Web + Network | Free + Pro |
| OffSec Proving Grounds | offensive-security.com | Network pentesting | Paid |
| PicoCTF | picoctf.org | CTF for beginners | Free |
📡 "The network is the battlefield — know it better than your enemy."
সব কিছু শুধুমাত্র নিজের network বা authorized lab-এ practice করো। অন্যের system-এ permission ছাড়া কাজ করা আইনত দণ্ডনীয়। Practice everything only on your own network or authorized lab. Accessing others' systems without permission is punishable by law.
Network Hacking & Wireless Security v1.0 — 12 Chapters | সম্পূর্ণ বাংলা গাইড