CHAPTER 4
Sniffing and Evasion
This chapter includes questions from the following topics:
• Describe sniffing concepts, including active and passive sniffing and protocols susceptible to sniffing
• Describe ethical hacking techniques for Layer 2 traffic
• Describe sniffing tools and understand their output
• Describe sniffing countermeasures
• Learn about intrusion detection system (IDS), firewall, and honeypot types, use, and placement
• Describe IDS, firewall, and honeypot evasion techniques
Overhearing a conversation, whether intentionally or via eavesdropping, is just part of our daily lives. Sometimes we sniff conversations without even meaning or trying to—it just happens. Anyone who has worked in a cube-farm office environment ...
Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.