Understanding the OSI model is important in ethical hacking as it outlines how the network interface card encapsulates the data as it is prepared for transit on the network.
- View Offline
- [Instructor] Effective packet analysis…requires a solid understanding of encapsulation,…and protocols such as TCP, IP and DNS.…The seven-layer OSI model standardizes…the functions of data transformation…by breaking it down into layers,…and in particular, outlines how the network interface card…encapsulates the data as it is…prepared for transit on the network.…I'll review each layer and describe the main function.…I'll discuss some common protocols in that layer,…state the protocol data unit which defines…the shape the data is in in that particular layer,…and we'll talk about any addresses that are needed,…such as MAC address or IP address.…
We'll start at layer seven.…This is the application layer.…This is where we initiate contact with the network.…And we see we use various protocols…such as HTTP, FTP, or SMTP.…The protocol data unit at this point is data.…And there are no addresses used in this layer.…Layer six is the presentation layer.…The presentation layer properly presents data to the user.…For example, if you get a JPEG that's an image,…
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Sniffing network traffic
- Passive vs. active attacks
- Comparing IPv4 to IPv6
- MAC and macof attacks
- Investigating DHCP attacks
- Detecting ARP and DNS spoofing
- Sniffing tools and techniques