02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents xv<br />

Overt and Covert Channels 203<br />

Summary 205<br />

Exam Essentials 205<br />

Review Questions 206<br />

Chapter 9 Sniffers 209<br />

Understanding Sniffers 210<br />

Using a Sniffer 212<br />

Sniffing Tools 213<br />

Wireshark 214<br />

TCPdump 218<br />

Reading Sniffer Output 221<br />

Switched Network Sniffing 224<br />

MAC Flooding 224<br />

ARP Poisoning 225<br />

MAC Spoofing 226<br />

Port Mirror or SPAN Port 227<br />

On the Defensive 227<br />

Mitigating MAC Flooding 228<br />

Detecting Sniffing Attacks 230<br />

Exam Essentials 230<br />

Summary 230<br />

Review Questions 231<br />

Chapter 10 Social Engineering 235<br />

What Is Social Engineering? 236<br />

Why Does Social Engineering Work? 237<br />

Why is Social Engineering Successful? 238<br />

Social-Engineering Phases 239<br />

What Is the Impact of Social Engineering? 239<br />

Common Targets of Social Engineering 240<br />

What Is Social Networking? 241<br />

Mistakes in Social Media and Social Networking 243<br />

Countermeasures for Social Networking 245<br />

Commonly Employed Threats 246<br />

Identity Theft 250<br />

Protective Measures 250<br />

Know What Information Is Available 251<br />

Summary 252<br />

Exam Essentials 252<br />

Review Questions 254

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!