Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
Overview
Syllabus
Introduction
- Visualizing network traffic
- What you should know
- Hacking ethically
- Sniffing network traffic
- The OSI model
- Passive and active attacks
- Tapping into the data stream
- Comparing IPv4 to IPv6
- Challenge: Compare IPv4 to IPv6
- Solution: Compare IPv4 to IPv6
- macof attack demo
- Yersinia for exploiting protocols
- Spoofing a MAC address
- Defending against MAC attacks
- Investigating DHCP
- Depleting the DHCP pool
- Deploying a rogue DHCP server
- Defending against DHCP attacks
- Address Resolution Protocol
- Ettercap for ARP poison
- Detecting ARP spoofing
- Defending against ARP attacks
- Domain Name Systems
- Caching and forgery
- Poisoning DNS
- Defending against DNS spoofing
- Challenge: Investigate a DNS header
- Solution: Investigate a DNS header
- Capturing images
- Examining HTTP headers and URLs
- Sniffing with TShark and Wireshark
- Packet sniffing tools for mobile devices
- Investigating OmniPeek
- Other sniffing tools
- Defending against sniffing
- Next steps
Taught by
Lisa Bock