Module 7: Sniffing

Please purchase the course before starting the lesson.

Introduction: After having compromised a system or the machine of a user, there is no doubt that we can obtain much more information, such as passwords of some other systems, sensitive information or other confidential information. So our next target is to capture and analyze the traffic of the network in order to obtain the [...]

Back to: Ultimate IT Security Certification Bundle > EC-Council Certified Ethical Hacker (CEHv10)