intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Lecture Penetration testing: Capturing traffic

Chia sẻ: _ _ | Ngày: | Loại File: PDF | Số trang:13

16
lượt xem
5
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Lecture "Penetration testing: Capturing traffic" provide students with knowledge about: Networking for capturing traffic; ARP cache poisoning; SSL man-in-the-middle attacks;... Please refer to the detailed content of the lecture!

Chủ đề:
Lưu

Nội dung Text: Lecture Penetration testing: Capturing traffic

  1. Capturing Traffic
  2. Contents  Networking for Capturing traffic  ARP Cache Poisoning  SSL Man-in-the-Middle Attacks
  3. 1. Networking for Capturing traffic  Hubs Device:  Layer one device of the OSI model.  Send frames out on all ports including the port in which the frame was received on  Switches Device:  MAC address table  Switches provide separate collision domains on each port
  4. Using Wireshark  Wireshark is a graphical network protocol analyzer that lets us take a deep dive into the individual packets moving around the network.  Wireshark can be used to capture Ethernet, wireless, Bluetooth, and many other kinds of traffic
  5. 2. ARP Cache Poisoning  To capture traffic not intended for the Kali system, we need to find some way to have the relevant data sent to our Kali system.  Perform a man-in-the-middle attack: redirect and intercept traffic between two systems
  6. DNS Cache Poisoning  We can poison Domain Name Service (DNS) cache entries (mappings from domain names to IP addresses) to route traffic intended for another website to one we control.  We send a bunch of bogus DNS resolution replies pointing to the wrong IP address for a domain name
  7. 3. SSL Man-in-the-Middle Attacks  The goal of SSL is to provide reasonable assurance that any sensitive information transmitted between a user’s browser and a server is secure - unable to be read by a malicious entity along the way.
  8. How SSL work
  9. How SSL work
  10. SSL Man-in-the-Middle Attacks
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2