Get in Touch

Course Outline

Disabling Unnecessary Services

Flood Ping Attacks

Sniffing Techniques

  • Sniffit
  • Ettercap
  • Tcpdump

Network Monitoring

  • Port scanning using tools like nmap and Nessus
  • LAN traffic monitoring with iptraf
  • Monitoring changes in Ethernet network interface cards and IP assignments by users (arpwatch)
  • Network traffic dumping with tcpdump

Packet Logging

  • Logging packets using NetFilters and iptables mechanisms
  • IP Protocols Logger (ippl)

Firewall Configuration (Based on NetFilters and iptables)

  • Understanding packet flow through filters
  • Creating custom chains

Proxy Servers

  • WWW Proxy configuration using Squid

Cryptography

  • SSLwrap
  • SSH and SCP
  • SSH Tunneling

Spoofing and Information Gathering

  • Gathering information about IP address and domain ownership
  • Reporting legal violations to the appropriate authorities

Requirements

Familiarity with any Unix-like operating system and a foundational understanding of TCP/IP network structures.

 14 Hours

Testimonials (2)

Related Categories