image
4
Sniffing and Evasion
In this chapter you will
•  Learn about sniffing and protocols that are susceptible to sniffing
•  Describe active and passive sniffing
•  Describe ethical hacking techniques for layer 2 traffic
•  Learn about sniffing tools and displays
•  Describe sniffing countermeasures
•  Learn about intrusion detection system (IDS) types, use, and placement
•  Describe signature analysis within Snort
•  List IDS evasion techniques
•  Learn about firewall types, use, and placement
•  Describe firewall hacking tools and techniques
image
It’s ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.