Public Write-ups
  • 💻Lab Write-ups
    • Who is Space C4det
  • eJPT
    • eJPT Notes
      • Assessment Methodologies
        • Information Gathering
          • Introduction To Information Gathering
          • Passive and Active Information Gathering
        • Footprinting & Scanning
        • Enumeration
        • Vulnerability Assessment
  • Blue Team Labs Online
    • Remote Desktop Protocol (RDP)
    • 📝Phishy V1 BTLO
    • BITS (IN PROGRESS)
  • TCM Security Notes
    • TCM Security Notes
      • Viewing, Creating, and Editing Files
      • Users and Privileges
      • sudo and other commands
      • The OSI Model
      • Scripting with Bash
      • TCP, UDP, and the Three way Handshake
      • Common Network Commands
      • Installing and Updating Tools
      • IP Addresses
Powered by GitBook
On this page
  1. TCM Security Notes
  2. TCM Security Notes

IP Addresses

Layer 3 IP Addresses

Layer 2 MAC Addresses, identified as ether when using ifconfig. These can be thought of as physical addresses.

Switches communicate over this physical address.

This is how switches determine what device is what.

Anything that uses a network interface will have a MAC Address.

PreviousInstalling and Updating Tools

Last updated 3 years ago