Summary

This chapter showed you how to sniff a network with tcpdump, WinDump, and Wireshark, and how to filter for protocols and IP addresses. Following that, you got to play with spoofing and ARP poisoning using Ettercap.

In the next chapter, we will delve into password attacks. We will be cracking password hashes, such as those you might have recovered from sniffing NTLM packets on a Windows network. We will be using dictionary attacks. We will show you things that will encourage you to grow yourself some longer, more complex passwords.

Get Penetration Testing: A Survival Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.