O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Gathering Data from Networks: Sniffers

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Understand the protocol susceptible to sniffing

  • Understand active and passive sniffing

  • Understand ARP poisoning

  • Understand ethereal capture and display filters

  • Understand MAC flooding

  • Understand DNS spoofing techniques

  • Describe sniffing countermeasures

Gathering Data from Networks: Sniffers

Sniffers are used to capture traffic sent between two systems, but they can also provide a lot of other information. Depending on how the sniffer is used and the security measures in place, a hacker can use a sniffer to discover usernames, passwords, and other confidential information transmitted on the network. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required