We may earn an affiliate commission when you visit our partners.
Alexander Tushinsky

Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.

Read more

Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.

Once a foothold is established within a network, the next logical step is to try and capture the traffic of other systems to help gather intelligence. Having access to an internal network can provide a wealth of information, if you know how to look for it. In this course, Sniffing and Spoofing with Kali Linux, you’ll learn to use network packet inspection to your advantage. First, you’ll explore the ability to sniff and look at network traffic by using Ettercap and TCPDump to create a MAC flood attack. Next, you’ll discover how to perform an ARP poisoning attack, which establishes you as the “man-in-the-middle”, spying on traffic between a target PC and the router. Finally, you can implement a DNS spoofing attack, which ultimately can easily help you establish an additional foothold and provide you with a great deal of information about our target. When you’re finished with this course, you’ll have the skills and knowledge to work with Ettercap and TCPDump, tools needed to perform sniffing and spoofing attacks as part of a penetration test.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Active and Passive Network Sniffing
Sniffing and Spoofing

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches Sniffing and Spoofing, valuable techniques for penetration testing
Builds strong foundation for understanding network sniffing and spoofing techniques
Instructors Alexander Tushinsky are highly regarded for their expertise in network sniffing and spoofing techniques
Teaches how to perform MAC flood attacks, ARP poisoning, and DNS spoofing attacks
Taught by Alexander Tushinsky, a renowned network security expert
May require learners to have some prior knowledge in network sniffing and spoofing techniques

Save this course

Save Sniffing and Spoofing with Kali Linux to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Sniffing and Spoofing with Kali Linux with these activities:
Sniffing and Spoofing Discussion Group
Engage with peers to discuss and troubleshoot sniffing and spoofing techniques.
Show steps
  • Join a discussion group
  • Participate in discussions
  • Ask questions
  • Share your knowledge
Wireshark Tutorial
Enhance your network analysis skills by learning Wireshark.
Show steps
  • Find a Wireshark tutorial
  • Follow the tutorial steps
  • Practice using Wireshark to analyze network traffic
TCPDump Tutorial
Expand your knowledge of TCPDump by following a guided tutorial.
Show steps
  • Find a TCPDump tutorial
  • Follow the tutorial steps
  • Experiment with TCPDump commands
Four other activities
Expand to see all activities and additional details
Show all seven activities
Ettercap Lab
Solidify your understanding of Ettercap's capabilities through hands-on experimentation.
Show steps
  • Spin up a virtual machine
  • Install Ettercap
  • Target a victim machine
  • Execute a MAC flood attack
  • Analyze the captured traffic
ARP Poisoning Lab
Develop hands-on experience with ARP poisoning through a dedicated lab.
Show steps
  • Spin up a virtual machine
  • Configure a network
  • Execute an ARP poisoning attack
  • Analyze the captured traffic
DNS Spoofing Lab
Gain practical experience with DNS spoofing through a dedicated lab.
Show steps
  • Spin up a virtual machine
  • Configure a network
  • Execute a DNS spoofing attack
  • Analyze the captured traffic
Network Security Report
Demonstrate your understanding of sniffing and spoofing techniques by creating a comprehensive network security report.
Show steps
  • Gather information on sniffing and spoofing techniques
  • Analyze network traffic using Ettercap and TCPDump
  • Identify and document network vulnerabilities
  • Develop recommendations for improving network security
  • Write a comprehensive report summarizing your findings and recommendations

Career center

Learners who complete Sniffing and Spoofing with Kali Linux will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
A Network Security Engineer designs, implements, and manages security controls to protect computer networks. They analyze security threats, develop security policies, and implement security measures to prevent unauthorized access to networks and data. The Sniffing and Spoofing with Kali Linux course can help build a foundation for a career as a Network Security Engineer by providing you with the skills to identify and mitigate security risks.
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer systems and networks. They analyze security risks, develop security policies, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and mitigate security risks, making it a valuable asset for a career as an Information Security Analyst.
Security Consultant
A Security Consultant provides guidance and support to organizations on how to improve their security posture. They assess security risks, develop security plans, and implement security controls. The Sniffing and Spoofing with Kali Linux course can help you develop the skills to identify and mitigate security risks, making it a valuable asset for a career as a Security Consultant.
Penetration Tester
A Penetration Tester is responsible for identifying and exploiting vulnerabilities in computer systems and networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as a Penetration Tester.
Computer Forensic Analyst
A Computer Forensic Analyst investigates computer crimes and provides expert testimony in court. They analyze digital evidence, identify and exploit vulnerabilities, and develop security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as a Computer Forensic Analyst.
Incident Responder
An Incident Responder is responsible for responding to and mitigating security incidents. They analyze security logs, identify and exploit vulnerabilities, and develop security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as an Incident Responder.
Vulnerability Manager
A Vulnerability Manager is responsible for identifying and managing vulnerabilities in computer systems and networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course can provide you with the skills to identify and exploit vulnerabilities, making it a valuable asset for a career as a Vulnerability Manager.
Security Architect
A Security Architect designs and implements security solutions for organizations. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Security Architect.
Cybersecurity Analyst
A Cybersecurity Analyst analyzes security threats and develops security measures to protect computer networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Cybersecurity Analyst.
IT Security Manager
An IT Security Manager is responsible for managing the security of an organization's computer systems and networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as an IT Security Manager.
Network Administrator
A Network Administrator is responsible for managing and maintaining computer networks. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Network Administrator.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining computer systems. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Systems Administrator.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Software Engineer.
Web Developer
A Web Developer designs and develops websites. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Web Developer.
Database Administrator
A Database Administrator is responsible for managing and maintaining databases. They assess security risks, develop security plans, and implement security controls to prevent unauthorized access to data. The Sniffing and Spoofing with Kali Linux course may provide you with some of the skills to identify and mitigate security risks, making it a helpful asset for a career as a Database Administrator.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Sniffing and Spoofing with Kali Linux.
This classic text provides essential principles for security engineering, foundational and valuable knowledge for security professionals and those interested in securing their digital lives.
Focuses more on ethical hacking and defense, providing more depth into the concepts and mechanisms covered in this course.
This classic reference networking book can provide valuable background information on the network protocols and concepts that underlie the techniques and tools used in this course.
Covers a wider range of security tools and applications than this course, which may be valuable for more advanced students and those interested in learning outside the scope of the course.
Provides basic information on the topic of network security and some of the tools leveraged in this course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Sniffing and Spoofing with Kali Linux.
Ethical Hacking: Sniffing
Most relevant
Internet Security: A Hands-on Approach
Most relevant
Defense Evasion with ProxyChains
Most relevant
Packet Sniffing with Wireshark: Create Your First Filters
Most relevant
Post Exploitation with Kali Linux
Most relevant
Analyze Network Traffic with TCPDump
Most relevant
Attacks and Exploits: Network and Application Attacks for...
Most relevant
Threat Intelligence with MSTICPy
Most relevant
Persistence with pwncat
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser