Intercepting Communication


CSE 365 - Fall 2023.

Learn various techniques to intercept and manipulate network communication, from connecting to remote hosts to performing man-in-the-middle attacks.


Copy of the slides

Recorded Lectures:

10/11/23 Intercepting Communication Pt. 1":



10/16/23 Intercepting Communication Pt. 2":



10/18/23 Intercepting Communication Pt. 3":




10/18/23 Intercepting Communication Pt. 4":



The excellent kanak (creator of pwn.college) has recorded lectures and slides from prior CSE 365 that might be useful:

Intercepting Communication: Introduction



Intercepting Communication: Ethernet



Intercepting Communication: Internet Protocol



Intercepting Communication: Transmission Control Protocol



Intercepting Communication: Address Resolution Protocol



Connect to a remote host

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Listen for a connection from a remote host

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Find and connect to a remote host

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Find and connect to a remote host on a large network

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Monitor traffic from a remote host

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Monitor slow traffic from a remote host

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Hijack traffic from a remote host by configuring your network interface

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Manually send an Ethernet packet

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Manually send an Internet Protocol packet

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Manually send a Transmission Control Protocol packet

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Manually perform a Transmission Control Protocol handshake

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Manually send an Address Resolution Protocol packet

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Hijack traffic from a remote host using ARP

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Man-in-the-middle traffic between two remote hosts and inject extra traffic

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score