Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Sniffers

via LinkedIn Learning


Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.

Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark.

Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at


  • Welcome
  • What you should know
  • Hacking ethically
1. Sniffing Overview
  • Sniffing network traffic
  • The OSI model
  • Passive and active attacks
  • Tapping into the data stream
  • Comparing IPv4 to IPv6
2. MAC Attacks
  • macof attack demo
  • Yersinia for exploiting protocols
  • Spoofing a MAC address
  • Defending against MAC attacks
  • Investigating DHCP
  • Depleting the DHCP pool
  • Deploying a rogue DHCP server
  • Defending against DHCP attacks
4. ARP
  • Address Resolution Protocol
  • Ettercap for ARP poison
  • Detecting ARP spoofing
  • Defending against ARP attacks
5. DNS
  • Domain Name Systems
  • Caching and forgery
  • Poisoning DNS
  • Defending against DNS spoofing
6. Sniffing Tools and Techniques
  • Capturing images
  • Examining HTTP headers and URLs
  • Sniffing with TShark and Wireshark
  • Packet sniffing tools for mobile devices
  • Investigating OmniPeek
  • Other sniffing tools
  • Defending against sniffing
  • Next steps

Taught by

Lisa Bock

Related Courses


Start your review of Ethical Hacking: Sniffers

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free