Chapter 7. Sniffers, Session Hijacking, and Denial of Service

This chapter covers the following topics:

Image Sniffers: Although not specifically designed to be hacking tools, sniffers can be used to find many types of clear-text network traffic.

Image Session Hijacking: Builds on the sniffing techniques to not only watch traffic but actually intercept and take over a valid connection.

Image Denial of Service, Distributed Denial of Service, and Botnets: A general ...

Get Certified Ethical Hacker (CEH) Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.