Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.
Once a foothold is established within a network, the next logical step is to try and capture the traffic of other systems to help gather intelligence. Having access to an internal network can provide a wealth of information, if you know how to look for it. In this course, Sniffing and Spoofing with Kali Linux, you’ll learn to use network packet inspection to your advantage. First, you’ll explore the ability to sniff and look at network traffic by using Ettercap and TCPDump to create a MAC flood attack. Next, you’ll discover how to perform an ARP poisoning attack, which establishes you as the “man-in-the-middle”, spying on traffic between a target PC and the router. Finally, you can implement a DNS spoofing attack, which ultimately can easily help you establish an additional foothold and provide you with a great deal of information about our target. When you’re finished with this course, you’ll have the skills and knowledge to work with Ettercap and TCPDump, tools needed to perform sniffing and spoofing attacks as part of a penetration test.
Once a foothold is established within a network, the next logical step is to try and capture the traffic of other systems to help gather intelligence. Having access to an internal network can provide a wealth of information, if you know how to look for it. In this course, Sniffing and Spoofing with Kali Linux, you’ll learn to use network packet inspection to your advantage. First, you’ll explore the ability to sniff and look at network traffic by using Ettercap and TCPDump to create a MAC flood attack. Next, you’ll discover how to perform an ARP poisoning attack, which establishes you as the “man-in-the-middle”, spying on traffic between a target PC and the router. Finally, you can implement a DNS spoofing attack, which ultimately can easily help you establish an additional foothold and provide you with a great deal of information about our target. When you’re finished with this course, you’ll have the skills and knowledge to work with Ettercap and TCPDump, tools needed to perform sniffing and spoofing attacks as part of a penetration test.