image

CHAPTER 5

Hacking Through the Network: Sniffers and Evasion

In this chapter you will learn about

• Sniffing and protocols that are susceptible to sniffing

• Describing active and passive sniffing

• Describing ethical hacking techniques for layer 2 traffic

• Sniffing tools and displays

• Describing sniffing countermeasures

• Intrusion detection system (IDS) types, use, and placement

• Describing signature analysis within Snort

• Listing IDS evasion techniques

• Firewall types, use, and placement

• Describing firewall hacking tools and techniques

• Use and placement of a honeypot

My office sits on the corner of two hallways, which dead-end just ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.