Michael BestMan
Posted: June 24, 2025 • 4 min Read
In my our blog post, we deconstructed the invisible choreography behind typing a web address into your browser. Today, we’re pulling the curtain back even further to explore two of the most fundamental building blocks of the internet: IP addresses and the Domain Name System (DNS). Why do these matter for cybersecurity? Every breach, every attack surface, and every exploit starts with a connection and connections begin with IP and DNS. Securing the digital perimeter starts by mastering its infrastructure.
Imagine trying to deliver a package without a physical address. That's what communication would look like online without IP addresses. Every device from smartphones, laptops, servers and IoT devices requires an IP address to send, receive, or forward data across a network.
Two Primary IP Address Types:
Before CIDR became the norm, IP addresses were organised into classes to allocate them by network size.
Class | Network ID Bits | Typical Range | Example IP | Use Case |
---|---|---|---|---|
A | 8 | 1.0.0.0 - 126.255.255.255 | 10.0.0.1 | Large corporations |
B | 16 | 128.0.0.0 - 191.255.255.255 | 172.16.0.1 | Mid-sized orgs |
C | 24 | 192.0.0.0 - 223.255.255.255 | 192.168.1.1 | Homes & SMBs |
Class A is used for large networks. It has the following structure:
Class B is used for medium-sized networks. Structure:
Class C is used for smaller networks. Structure:
However, Class D (first decimal range: 224-239) and Class E (240-255) are the only classes without bits allocated to their network and host IDS. Class D, for instance, is used for many-to-many communication as against an individual host. While Class E is reserved for experimental and research.
The class-based model was inefficient, often leading to IP wastage.
CIDR to the Rescue: Classless Inter-Domain Routing (CIDR) replaced classful addressing. CIDR allows flexible allocation, e.g., 192.168.1.0/24, enabling better IP space optimisation and route summarisation, which is a critical function for ISPs and Border Gateway Protocol routing.
IPv4 and Binary Representation: IPv4 addresses consist of 32 bits, split into four 8-bit segments known as octets. A typical IPv4 address like 192.168.0.1 looks simple, but is binary magic under the hood:
11000000.10101000.00101111.00000011
The first three octets define the network address, the last refers to the host.
Bits vs Bytes
The limited IPv4 space (~4.3 billion addresses) is insufficient for our hyperconnected world. Enter IPv6.
IPv6 expands the address space from 32 bits to 128 bits, allowing approximately 340 undecillion addresses (yes, that's 340 followed by 36 zeros). This solves address exhaustion while introducing protocol improvements.
Example:
2001:0db8:85a3:0000:0000:8a2e:0370:7334 → compressed: 2001:db8:85a3::8a2e:370:7334
Why IPv6 Matters:
Many modern attacks and threat campaigns exploit misconfigured IPv6 settings or overlooked dual-stack networks, highlighting the importance of securing both IPv4 and IPv6 endpoints.
Think of DNS as the Internet's phonebook. It resolves human-readable domain names like reinventsecurity.org into machine-readable IP addresses like 142.250.185.206.
DNS Advantages:
Command-Line Diagnostics
ping: Check network latency.
ping reinventsecurity.org
nslookup: Retrieve DNS info.
This returns the time taken for packets to travel to the server and back.
nslookup reinventsecurity.org
This provides details on DNS servers and domain IPs.
For enterprise blue teams, these commands can be automated into playbooks for proactive infrastructure monitoring.
Misconfigurations or exploits targeting IP and DNS systems can result in:
In the 2016 Dyn DNS attack, major sites like Twitter and Netflix went offline. The attack weaponised IoT devices with hardcoded credentials, turning them into a massive botnet (Mirai).
Cybersecurity teams must actively monitor DNS traffic, segment network zones using IP blocks, and implement DNSSEC (Domain Name System Security Extensions) to authenticate DNS responses. IP addresses and DNS are the backbone of every data transaction across the internet. Whether you're a red teamer enumerating targets or a blue teamer hardening infrastructure, these systems must be understood, monitored, and secured with precision.
At Reinvent Security, we believe that deepening your grasp of foundational technologies like IP and DNS is the first step to building resilient, attack-aware systems.