Class Notes for doing CEH
Class Notes for doing CEH
---
---
---
---
---
---
## **6. Sniffing**
- **Definition**: Capturing and analyzing network traffic.
- **Types of Sniffing**:
- Passive: Monitoring traffic without injecting packets.
- Active: Intercepting or modifying traffic (e.g., MITM attacks).
- **Tools**:
- Wireshark: Network protocol analyzer.
- Tcpdump: Command-line packet analyzer.
- **Countermeasures**:
- Encrypt traffic (e.g., HTTPS, VPNs).
- Use secure protocols (e.g., SSH over Telnet).
---
---
---
## **9. Cryptography**
- **Key Concepts**:
- Symmetric Encryption: Uses one key (e.g., AES, DES).
- Asymmetric Encryption: Public and private keys (e.g., RSA, ECC).
- Hashing: One-way encryption (e.g., MD5, SHA-256).
- **Applications**:
- SSL/TLS for secure communication.
- Digital signatures for authentication.
- Blockchain for decentralized records.
- **Tools**:
- OpenSSL, Hashcat.
---
---
---
---
---
This summary provides a high-level overview of key CEH concepts and tools. Let me
know if you need detailed explanations for specific topics!