Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
Tags
Syllabus
Introduction
- Visualizing network traffic
- What you should know
- Hacking ethically
- Sniffing network traffic
- The OSI model
- Passive and active attacks
- Tapping into the data stream
- Comparing IPv4 to IPv6
- Challenge: Compare IPv4 to IPv6
- Solution: Compare IPv4 to IPv6
- macof attack demo
- Yersinia for exploiting protocols
- Spoofing a MAC address
- Defending against MAC attacks
- Investigating DHCP
- Depleting the DHCP pool
- Deploying a rogue DHCP server
- Defending against DHCP attacks
- Address Resolution Protocol
- Ettercap for ARP poison
- Detecting ARP spoofing
- Defending against ARP attacks
- Domain Name Systems
- Caching and forgery
- Poisoning DNS
- Defending against DNS spoofing
- Challenge: Investigate a DNS header
- Solution: Investigate a DNS header
- Capturing images
- Examining HTTP headers and URLs
- Sniffing with TShark and Wireshark
- Packet sniffing tools for mobile devices
- Investigating OmniPeek
- Other sniffing tools
- Defending against sniffing
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/a4014540eb83.jpeg)
Ethical Hacking: Sniffers
Affiliate notice
-
TypeOnline Course
-
Provider
Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
Introduction
- Visualizing network traffic
- What you should know
- Hacking ethically
- Sniffing network traffic
- The OSI model
- Passive and active attacks
- Tapping into the data stream
- Comparing IPv4 to IPv6
- Challenge: Compare IPv4 to IPv6
- Solution: Compare IPv4 to IPv6
- macof attack demo
- Yersinia for exploiting protocols
- Spoofing a MAC address
- Defending against MAC attacks
- Investigating DHCP
- Depleting the DHCP pool
- Deploying a rogue DHCP server
- Defending against DHCP attacks
- Address Resolution Protocol
- Ettercap for ARP poison
- Detecting ARP spoofing
- Defending against ARP attacks
- Domain Name Systems
- Caching and forgery
- Poisoning DNS
- Defending against DNS spoofing
- Challenge: Investigate a DNS header
- Solution: Investigate a DNS header
- Capturing images
- Examining HTTP headers and URLs
- Sniffing with TShark and Wireshark
- Packet sniffing tools for mobile devices
- Investigating OmniPeek
- Other sniffing tools
- Defending against sniffing
- Next steps
Tags
Loading...
Saving...
Loading...