Get in Touch

Course Outline

Disabling Unnecessary Services

Flood Ping Techniques

Packet Sniffing

  • Sniffit
  • Ettercap
  • Tcpdump

Network Monitoring

  • Port scanning using tools like nmap and Nessus
  • LAN traffic analysis with iptraf
  • Monitoring Ethernet interface and IP address changes via arpwatch
  • Traffic dumping with tcpdump

Packet Logging

  • Logging packet data using NetFilters and iptables mechanisms
  • Utilizing the IP Protocols Logger (ippl)

Firewall Configuration (Based on NetFilters and iptables)

  • Understanding packet traversal through filter chains
  • Creating custom firewall chains

Proxy Servers

  • Web proxy configuration with Squid

Cryptography and Encryption

  • SSLwrap
  • SSH and SCP for secure file transfer and remote access
  • SSH tunneling techniques

Spoofing and Attribution

  • Gathering information regarding IP address and domain ownership
  • Procedures for reporting legal breaches to relevant authorities

Requirements

Familiarity with Unix-like operating systems and a foundational understanding of TCP/IP network architecture.

 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories