Module 7: Sniffing

Introduction: After having compromised a system or the machine of a user, there is no doubt that we can obtain much more information, such as passwords of some other systems, sensitive information or other confidential information. So our next target is to capture and analyze the traffic of the network in order to obtain the [...]

Back to: Certified Ethical Hacker v10