From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Eavesdropping attacks
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Eavesdropping attacks
- [Instructor] If an attacker is able to gain physical or logical access to a network, they may be able to eavesdrop on communications between two systems on that network. These attacks can be especially dangerous if the attacker is able to decrypt encrypted communications and view confidential information without the sender's knowledge or consent. All eavesdropping attacks requires some compromise of the communication path between a client and a server. This might include tapping into a network device or cable or conducting a DNS or ARP poisoning attack to trick a system into sending traffic directly to the attacker instead of the intended recipient. In a moment, we'll take a look at a few different types of eavesdropping attacks but before we do that, here's just a quick reminder of how web communications take place. A user running a web browser initiates a connection to a server located somewhere off in a data center.…
Contents
-
-
-
-
-
-
-
-
-
Denial of service attacks4m 15s
-
Eavesdropping attacks4m 12s
-
DNS attacks3m 30s
-
Layer 2 attacks2m 3s
-
Network address spoofing3m 38s
-
Wireless attacks2m 59s
-
Propagation attacks4m 19s
-
Preventing rogues and evil twins2m 50s
-
Disassociation attacks2m 10s
-
Understanding Bluetooth and NFC attacks2m 2s
-
RFID security2m 25s
-
-
-
-