Skip to Content
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
book

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

by Dale Meredith
July 2022
Intermediate to advanced
664 pages
15h 56m
English
Packt Publishing
Content preview from Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Chapter 10: Sniffing and Evading IDS, Firewalls, and Honeypots

Sniffing is an old method with new technology. Back in the day—before smartphones—we had telephones. There was a method used to tap into the phone line and listen in on conversations. You could record traffic, as well as intercepting data going across the line.

This required you to select a target and then connect with a listening or recording device. This was typically achieved by unofficial or official channels—depending on the legality—as well as a direct line mechanism. You could also use radio wiretaps. The whole purpose here was to listen in on conversations or record data that was flowing.

An attacker can intercept and read any network packet containing plaintext information. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Certified Ethical Hacker (CEH) Study Guide

Certified Ethical Hacker (CEH) Study Guide

Matt Walker
Certified Ethical Hacker (CEH) v.12

Certified Ethical Hacker (CEH) v.12

ACI Learning, Daniel Lowrie, Sophie Goodwin

Publisher Resources

ISBN: 9781801813099