Summary

During the course of this chapter, we covered the essentials of ARP and how attackers leverage vulnerabilities within ARP to perform ARP poisoning and MITM attacks on networks. Additionally, we took a look at using Wireshark to help us analyze network traffic so that we can quickly detect MITM and ARP attacks.

Now, you have the knowledge and skills to understand how ARP and MITM attacks can be detected using Wireshark and how to implement security controls on your network switches. I hope this chapter will prove helpful and informative for your studies and career.

In Chapter 13, Client-Side Attacks - Social Engineering, you'll learn about various social engineering techniques.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.140.185.123