Learn about ethical hacking, one of the most desired stills for any IT security professional.
Overview
Syllabus
Introduction
- Visualizing network traffic
- What you should know
- Hacking ethically
- Sniffing network traffic
- Using other sniffing tools
- Dissecting the OSI model
- Comparing passive and active attacks
- Using Wireshark
- Tapping into the data stream
- Launching a macof attack
- Exploiting Layer 2 protocols
- Spoofing a MAC address
- Defending against MAC attacks
- VLAN hopping attack
- Spoofing IRDP
- Investigating DHCP
- Depleting the DHCP pool
- Deploying a rogue DHCP server
- Defending against DHCP attacks
- Challenge: Identifying key elements in a capture
- Solution: Identifying key elements in a capture
- Describing ARP
- Exploring ARP spoofing tools
- Detecting ARP spoofing
- Defending against ARP attacks
- Summarizing DNS
- Caching and forgery
- Poisoning DNS
- Guarding against DNS attacks
- Challenge: Investigate a DNS header
- Solution: Investigate a DNS header
- Capturing images
- Examining HTTP headers and URLs
- Scooping data with TShark
- Sniffing tools for mobile devices
- Investigating Omnipeek
- Guarding against sniffing
- Next steps
Taught by
Lisa Bock