CHAPTER 4
Sniffing and Evasion
In this chapter you will
• Describe sniffing concepts, including active and passive sniffing and protocols susceptible to sniffing
• Describe ethical hacking techniques for Layer 2 traffic
• Describe sniffing tools and understand their output
• Describe sniffing countermeasures
• Learn about intrusion detection system (IDS), firewall, and honeypot types, use, and placement
• Describe signature analysis within Snort
• Describe IDS, firewall, and honeypot evasion techniques
I used to work in an office building just up the road from my home. My office was located at the end of a dead-end hallway that had a large window overlooking the giant parking lot. Oftentimes, people would walk down to the end of the ...
Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.