Intercepting Communication


Intro to Cybersecurity

Learn various techniques to intercept and manipulate network communication, from connecting to remote hosts to performing man-in-the-middle attacks.


Lectures and Reading


Challenges

Connect to a remote host

Listen for a connection from a remote host

Find and connect to a remote host

Find and connect to a remote host on a large network

Monitor traffic from a remote host

Monitor slow traffic from a remote host

Hijack traffic from a remote host by configuring your network interface

Manually send an Ethernet packet

Manually send an Internet Protocol packet

Manually send a Transmission Control Protocol packet

Manually perform a Transmission Control Protocol handshake

Manually send an Address Resolution Protocol packet

Hijack traffic from a remote host using ARP

Man-in-the-middle traffic between two remote hosts and inject extra traffic


Ranking

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score