Intercepting Communication


Intro to Cybersecurity

Learn various techniques to intercept and manipulate network communication, from connecting to remote hosts to performing man-in-the-middle attacks.


Lectures and Reading


Challenges

Connect to a remote host

Listen for a connection from a remote host

Find and connect to a remote host

Find and connect to a remote host on a large network

Monitor traffic from a remote host

Monitor slow traffic from a remote host

Hijack traffic from a remote host by configuring your network interface

Manually send an Ethernet packet

Manually send an Internet Protocol packet

Manually send a Transmission Control Protocol packet

Manually perform a Transmission Control Protocol handshake

Manually send an Address Resolution Protocol packet

Hijack traffic from a remote host using ARP

Man-in-the-middle traffic between two remote hosts and inject extra traffic


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score