UDP

Download

Hey, everybody, welcome to the next video.

So in this video, we're going to be talking about the counterpart of TCP IP, which is UDP.

Now, UDP, or user data protocol is considered the opposite of TCP IP in the regards that it doesn't

care whether the packet is lost, mangled, destroyed, corrupted during transmit the data sent.

That received whatever comes in, in the other end, it's up to the application that's requesting it

to deal with what the data looks like.

This also means that it can arrive in any order.

So you could get you could send a thousand packets and get the last nine hundred, you know, 10, 500

milliseconds later when you're not expecting it.

And it could be in any which way or guess it could send you can send it one, two, three, four.

And it receives for three or four, two, three, one.

So it's up to the application itself to decide to determine what order it needs to be in.

Now, UDP is a connection, less or stateless protocol.

The reason for that is it's much faster.

It doesn't require a three way handshake.

It just sends data and you receive data now for all the red teamers.

The reason this is important is because when you start doing port scans on UDP, if depending on how

the system has been configured, it might respond over UDP to every port.

So it might look like everything is open.

So you need to be aware of that.

We're going to have to go over that during the the unmap or the port scanning video itself.

But I just want you to be aware of that trip and that that pitfall for UDP.

Now, like TCP, it does a three way handshake.

It affirms the connection beforehand and then it checks and acknowledges every packet.

UDP does not do that and is mainly used for like web email, I'm sorry, not email movie streaming,

because losing a few packets or even a hundred or so packets every now and then when you're watching

a video is something you might not even see.

So just keep that in mind.

UDP is also important for scanning purposes because there are services like DNS that only work over

or over UDP and then there's also exploits on software that run over YouTube.

So it's just as important to scan as TCP IP.

So when you're going through an engagement, don't just scan TCP Schenn UDP because you're going to

you might find something or that might give you more information on UDP than you would on TV.

Hey, everybody, welcome to the next video.

So in this video, we're going to be talking about the counterpart of TCP/IP, which is UDP.

Now, UDP, or user datagram protocol is considered the opposite of TCP/IP in the regards that it doesn't care whether the packet is lost, mangled, destroyed, corrupted during transit.

The data sent, data is received whatever comes in, in the other end, it's up to the application that's requesting it to deal with what the data looks like.

This also means that it can arrive in any order.

So you could get you could send a 1000 packets and get the last 900, you know, 10, 500 milliseconds later when you're not expecting it.

And it could be in any which way or guess it could send you can send it 1, 2, 3, 4.

And it receives 4, 3 or 4, 2, 3, 1.

So it's up to the application itself to decide to determine what order it needs to be in.

Now, UDP is a connectionless or stateless protocol.

The reason for that is it's much faster.

It doesn't require a three way handshake.

It just sends data and you receive data.

Now for all the red teamers, the reason this is important is because when you start doing port scans on UDP, if depending on how the system has been configured, it might respond over UDP to every port.

So it might look like everything is open.

So you need to be aware of that.

We're going to have to go over that during the the unmap or the port scanning video itself.

But I just want you to be aware of that trip and that that pitfall for UDP.

Now, like TCP, it does a three way handshake. It affirms the connection beforehand and then it checks and acknowledges every packet.

UDP does not do that and is mainly used for like web, email, I'm sorry, not email movie, streaming, because losing a few packets or even a hundred or so packets every now and then when you're watching a video is something you might not even see.

So just keep that in mind.

UDP is also important for scanning purposes because there are services like DNS that only work over or over UDP and then there's also exploits on software that run over UDP.

So it's just as important to scan as TCP.

So when you're going through an engagement, don't just scan TCP, scan UDP because you're going to you might find something or that might give you more information on UDP than you would on TCP.

Complete and Continue  

Become a Member and Get Unlimited Access to 330+ Top Cyber Security Courses.