Kali Linux

  1. The Kali Linux Toolkit: Sniffing and Spoofing
    1. Network Sniffing Fundamentals
      1. Network Protocols Overview
        1. Packet Structure Analysis
          1. Network Topologies
            1. Switched vs Hub Networks
            2. Network Packet Capture
              1. Wireshark
                1. Interface Selection
                  1. Capture Filters
                    1. Display Filters
                      1. Protocol Analysis
                        1. Stream Following
                          1. Statistics and Analysis
                            1. Export Options
                            2. tcpdump
                              1. Command Line Options
                                1. Filter Expressions
                                  1. Output Formats
                                    1. Advanced Usage
                                    2. tshark
                                      1. Command Line Wireshark
                                        1. Automated Analysis
                                          1. Scripting Integration
                                        2. Network Sniffing Tools
                                          1. ettercap
                                            1. ARP Poisoning
                                              1. DNS Spoofing
                                                1. Plugin System
                                                  1. Filters and Scripts
                                                  2. dsniff
                                                    1. Password Sniffing
                                                      1. Email Sniffing
                                                        1. URL Sniffing
                                                        2. NetworkMiner
                                                          1. Network Forensics
                                                            1. File Extraction
                                                              1. Host Analysis
                                                            2. Man-in-the-Middle Attacks
                                                              1. ARP Spoofing
                                                                1. arpspoof
                                                                  1. ettercap ARP Poisoning
                                                                    1. ARP Cache Poisoning
                                                                    2. DNS Spoofing
                                                                      1. DNS Cache Poisoning
                                                                        1. Local DNS Spoofing
                                                                          1. ettercap DNS Plugin
                                                                          2. DHCP Spoofing
                                                                            1. Rogue DHCP Server
                                                                              1. DHCP Starvation
                                                                              2. Modern MITM Tools
                                                                                1. Bettercap
                                                                                  1. Network Discovery
                                                                                    1. ARP Spoofing
                                                                                      1. DNS Spoofing
                                                                                        1. HTTP/HTTPS Proxy
                                                                                          1. Wireless Attacks
                                                                                            1. Scripting Engine
                                                                                        2. Protocol-Specific Attacks
                                                                                          1. HTTP/HTTPS Attacks
                                                                                            1. SSL Stripping
                                                                                              1. HTTP Injection
                                                                                                1. Session Hijacking
                                                                                                2. Email Protocol Attacks
                                                                                                  1. SMTP Sniffing
                                                                                                    1. POP3/IMAP Sniffing
                                                                                                    2. FTP Attacks
                                                                                                      1. FTP Sniffing
                                                                                                        1. FTP Bounce Attacks
                                                                                                        2. Telnet and SSH
                                                                                                          1. Credential Sniffing
                                                                                                            1. Session Analysis
                                                                                                          2. MAC Address Manipulation
                                                                                                            1. MAC Address Spoofing
                                                                                                              1. macchanger
                                                                                                                1. Random MAC Generation
                                                                                                                  1. Vendor-Specific MACs
                                                                                                                    1. MAC Address Lists
                                                                                                                  2. MAC Address Analysis
                                                                                                                    1. Wireless MAC Spoofing
                                                                                                                    2. Network Spoofing Countermeasures
                                                                                                                      1. ARP Protection
                                                                                                                        1. DNS Security
                                                                                                                          1. Network Segmentation
                                                                                                                            1. Encryption Implementation