1. Trang chủ
  2. » Giáo Dục - Đào Tạo

lecture penetration testing lesson 4 8193

13 1 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Lecture Penetration Testing Lesson 4 8193
Trường học Unknown University
Chuyên ngành Computer Networking / Cybersecurity
Thể loại Lecture Notes
Năm xuất bản Unknown Year
Thành phố Unknown City
Định dạng
Số trang 13
Dung lượng 397 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Networking for Capturing traffic Hubs Device:  Layer one device of the OSI model..  Send frames out on all ports including the port in which the frame was received on  Switches Devic

Trang 1

Capturing Traffic

Trang 2

 Networking for Capturing traffic

 ARP Cache Poisoning

 SSL Man-in-the-Middle Attacks

Trang 3

1 Networking for Capturing traffic

Hubs Device:

 Layer one device of the OSI model.

 Send frames out on all ports including the port in

which the frame was received on

 Switches Device:

 MAC address table

 Switches provide separate collision domains on

each port

Trang 4

Using Wireshark

 Wireshark is a graphical network protocol analyzer that lets us take a deep

dive into the individual packets moving around the network

 Wireshark can be used to capture Ethernet, wireless, Bluetooth, and many other kinds of traffic

Trang 5

2 ARP Cache Poisoning

 To capture traffic not intended for the Kali system, we need to find some

way to have the relevant data sent to our Kali system

 Perform a man-in-the-middle attack: redirect and intercept traffic between two systems

Trang 8

DNS Cache Poisoning

 We can poison Domain Name Service (DNS) cache entries (mappings

from domain names to IP addresses) to route traffic intended for another website to one we control

 We send a bunch of bogus DNS resolution replies pointing to the wrong IP address for a domain name

Trang 10

3 SSL Man-in-the-Middle Attacks

 The goal of SSL is to provide reasonable assurance that any sensitive

information transmitted between a user’s browser and a server is secure -unable to be read by a malicious entity along the way

Trang 11

How SSL work

Trang 13

SSL Man-in-the-Middle Attacks

Ngày đăng: 12/12/2022, 21:22

TỪ KHÓA LIÊN QUAN