Join Lisa Bock for an in-depth discussion in this video Next steps, part of Ethical Hacking: Sniffers.
- View Offline
- [Instructor] Thank you for watching…Ethical Hacking Sniffing.…I've covered some of the concepts…such as the importance of the OSI model,…comparing active versus passive attacks,…and how you can tap into the data stream.…By now you'll have a better understanding of protocols…such as IP, DHCP, ARP, and DNS.…I've reviewed some the attacks against protocols…in layer two, such as cashing and forgery,…a Mackoff attack, and the plating in of the DHCP pool…using various tools such Ettercap and Yersinia.…
I demonstrated the many ways we can see what…is on our network such as data exchange,…router advertisements, and ARP and DHCP broadcasts.…I covered how HTTP headers can tell us the types…of servers and browsers that are used…during a webpage transaction.…In addition, we took a look at DriftNet,…a tool used to capture image.…I used Wireshark for most of the course,…but I covered some other tools for analysis as well…such as TShark and CloudShark.…
In general, you can see how sniffing can be a powerful tool…to test your network during an ethical hacking exercise.…
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Sniffing network traffic
- Passive vs. active attacks
- Comparing IPv4 to IPv6
- MAC and macof attacks
- Investigating DHCP attacks
- Detecting ARP and DNS spoofing
- Sniffing tools and techniques