5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Networks are constantly sending data to deliver messages and keep network services working, but those data packets may contain sensitive information like passwords. In this course, you'll examine how an attacker can gain access to sensitive data through packet sniffing. You'll learn how attackers can manipulate DHCP, which can allow them to then intercept target host communications. Next, you'll explore how attackers can manipulate ARP by taking advantage of the default functions of the ARP protocol. You'll move on to examine how attackers trick users into sharing personal information through DNS poisoning. Finally, you'll learn about common security controls that allow networks to communicate, while still adding layers of scrutiny, control, and obfuscation. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Sniffing & Poisoning

  • identify the different attacks an attacker can use to access sensitive data through network switches
  • recognize the physical ways attacks can access sensitive data
  • recognize the types of packets sniffing attackers can use to access sensitive data
  • use network attacks to bypass network switches in order to sniff packets
  • identify how using a rogue DHCP server can be used to intercept target host communications
  • recognize how attackers can manipulate DHCP on client systems
  • describe how to defend against attackers manipulating the Address Resolution Protocol (ARP) table
  • identify how attackers can manipulate the ARP table
  • recognize and manipulate the Address Resolution Protocol (ARP) table
  • describe how to view the DNS cache on a local system
  • identify the attack techniques that can be used against DNS
  • recognize how attackers trick users into accessing an invalid host via DNS poisoning
  • identify security controls that can be employed to add layers of security that can derail many sniffing attacks
  • recognize common security controls and settings that can be added to derail many sniffing attacks