Sniffing and Evasion

In this chapter you will

•  Describe sniffing concepts, including active and passive sniffing and protocols susceptible to sniffing

•  Describe ethical hacking techniques for Layer 2 traffic

•  Describe sniffing tools and understand their output

•  Describe sniffing countermeasures

•  Learn about intrusion detection system (IDS), firewall, and honeypot types, use, and placement

•  Describe signature analysis within Snort

•  Describe IDS, firewall, and honeypot evasion techniques

I used to work in an office building just up the road from me. My office sat on the corner of two hallways, which dead ended just outside with the door to the stairwell, about 5 feet beyond. There was a large window right at the end of ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.