July 2022
Intermediate to advanced
352 pages
9h 12m
English
This chapter includes questions from the following topics:
• Describe sniffing concepts, including active and passive sniffing and protocols susceptible to sniffing
• Describe ethical hacking techniques for Layer 2 traffic
• Describe sniffing tools and understand their output
• Describe sniffing countermeasures
• Learn about intrusion detection system (IDS), firewall, and honeypot types, use, and placement
• Describe IDS, firewall, and honeypot evasion techniques
Overhearing a conversation, whether intentionally or via eavesdropping, is just part of our daily lives. Sometimes we sniff conversations without even meaning or trying to—it just happens. Anyone who has worked in a cube-farm office environment ...
Read now
Unlock full access