O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4

Sniffing and Evasion

In this chapter you will

•  Describe sniffing concepts, including active and passive sniffing and protocols susceptible to sniffing

•  Describe ethical hacking techniques for Layer 2 traffic

•  Describe sniffing tools and understand their output

•  Describe sniffing countermeasures

•  Learn about intrusion detection system (IDS), firewall, and honeypot types, use, and placement

•  Describe signature analysis within Snort

•  Describe IDS, firewall, and honeypot evasion techniques

I used to work in an office building just up the road from me. My office sat on the corner of two hallways, which dead ended just outside with the door to the stairwell, about 5 feet beyond. There was a large window right at the end of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required