Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Ethical Hacking: Sniffers [Updated 1/13/2020]

Posted By: IrGens
Ethical Hacking: Sniffers [Updated 1/13/2020]

Ethical Hacking: Sniffers
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 20m | 155 MB
Instructor: Lisa Bock

Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark.

Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

Topics include:
Sniffing network traffic
Passive vs. active attacks
Comparing IPv4 to IPv6
MAC and macof attacks
Investigating DHCP attacks
Detecting ARP and DNS spoofing
Sniffing tools and techniques


Ethical Hacking: Sniffers [Updated 1/13/2020]