This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Sniffing: Crash Theory & Practice
Networking of Sniffing: Crash Theory & Practice
OSI Model - part 1 (5:18)
OSI Model - part 2 (4:23)
Hubs, Switches & Routers - overview (7:00)
Collision and Broadcast domains, VLANs (7:20)
Port Mirroring: SPAN & RSPAN (4:41)
Active, Passive and Totally Passive Sniffing (5:55)
Secure vs. Insecure protocols
Insecure protocols: viewing passwords sent via Telnet (3:39)
TAPs - theory & how to build a Passive Tap (+ schemes) (2:40)
Promiscuous mode & Monitor mode (3:00)
Place of a Sniffer (4:17)
Quiz
Sniffing attacks: Crash Theory & Practice
Prepare for Labs - 3 ways (1:16)
How to run Kali Linux in VirtualBox (3:31)
MAC Flooding - theory & practice (8:02)
ARP Spoofing - theory & practice (6:05)
Fake AP - overview (2:04)
DHCP attacks - part 1, theory (5:00)
DHCP attacks - part 2, practice (6:22)
DNS Spoofing - theory & practice (7:02)
SSL Hijacking - part 1, theory (5:23)
SSL Hijacking - part 2, practice (5:17)
Quiz
Hide & Detect
Hide & Detect - 1 (Classical anti-sniffing tests, theory) (6:35)
Hide & Detect - 2 (ARP test & effective detection ways) (6:37)
Quiz
Conclusion
Conclusion
Prepare for Labs - 3 ways
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock