Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Sniffers

Description

Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.

Tags

Syllabus

Introduction
  • Visualizing network traffic
  • What you should know
  • Hacking ethically
1. Sniffing Overview
  • Sniffing network traffic
  • The OSI model
  • Passive and active attacks
  • Tapping into the data stream
  • Comparing IPv4 to IPv6
  • Challenge: Compare IPv4 to IPv6
  • Solution: Compare IPv4 to IPv6
2. MAC Attacks
  • macof attack demo
  • Yersinia for exploiting protocols
  • Spoofing a MAC address
  • Defending against MAC attacks
3. DHCP
  • Investigating DHCP
  • Depleting the DHCP pool
  • Deploying a rogue DHCP server
  • Defending against DHCP attacks
4. ARP
  • Address Resolution Protocol
  • Ettercap for ARP poison
  • Detecting ARP spoofing
  • Defending against ARP attacks
5. DNS
  • Domain Name Systems
  • Caching and forgery
  • Poisoning DNS
  • Defending against DNS spoofing
  • Challenge: Investigate a DNS header
  • Solution: Investigate a DNS header
6. Sniffing Tools and Techniques
  • Capturing images
  • Examining HTTP headers and URLs
  • Sniffing with TShark and Wireshark
  • Packet sniffing tools for mobile devices
  • Investigating OmniPeek
  • Other sniffing tools
  • Defending against sniffing
Conclusion
  • Next steps

Online Course


Ethical Hacking: Sniffers

Affiliate notice

Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.

Introduction
  • Visualizing network traffic
  • What you should know
  • Hacking ethically
1. Sniffing Overview
  • Sniffing network traffic
  • The OSI model
  • Passive and active attacks
  • Tapping into the data stream
  • Comparing IPv4 to IPv6
  • Challenge: Compare IPv4 to IPv6
  • Solution: Compare IPv4 to IPv6
2. MAC Attacks
  • macof attack demo
  • Yersinia for exploiting protocols
  • Spoofing a MAC address
  • Defending against MAC attacks
3. DHCP
  • Investigating DHCP
  • Depleting the DHCP pool
  • Deploying a rogue DHCP server
  • Defending against DHCP attacks
4. ARP
  • Address Resolution Protocol
  • Ettercap for ARP poison
  • Detecting ARP spoofing
  • Defending against ARP attacks
5. DNS
  • Domain Name Systems
  • Caching and forgery
  • Poisoning DNS
  • Defending against DNS spoofing
  • Challenge: Investigate a DNS header
  • Solution: Investigate a DNS header
6. Sniffing Tools and Techniques
  • Capturing images
  • Examining HTTP headers and URLs
  • Sniffing with TShark and Wireshark
  • Packet sniffing tools for mobile devices
  • Investigating OmniPeek
  • Other sniffing tools
  • Defending against sniffing
Conclusion
  • Next steps