Sniffing

Capturing and analyzing network traffic.

Examines packet-sniffing techniques, including ARP poisoning, spoofing, DNS poisoning, and tools to intercept or monitor network traffic. Covers countermeasures and detection methods.
5 minutes 5 Questions

Sniffing refers to the practice of intercepting and monitoring data packets as they travel across a network. In the CEH (Certified Ethical Hacker) framework, it's considered a passive attack technique where attackers capture network traffic to extract valuable information. Sniffing works by placin…

Concepts covered: Sniffing Technique: Spoofing Attacks, Sniffing Concepts, Sniffing Technique: MAC Attacks, Sniffing Technique: DHCP Attacks, Sniffing Technique: ARP Poisoning, Sniffing Technique: DNS Poisoning, Sniffing Tools, Sniffing Countermeasures, Sniffing Detection Techniques

Test mode:
CEH - Sniffing Example Questions

Test your knowledge of Sniffing

Question 1

A multinational corporation reports that employees in certain branch offices are experiencing intermittent connection failures to the company's intranet portal. The IT security team discovers that when the portal's domain name is resolved, it returns different IP addresses than expected, but only for users in specific geographic locations. The company uses a global load balancing DNS infrastructure with multiple providers. Recently, several employees reported receiving emails about an "urgent intranet update" with attachment files. What is the most likely attack technique being employed in this scenario?

Question 2

Which of the following best describes the primary technique used in a MAC cloning attack?

Question 3

Which of the following accurately describes how ARP poisoning attacks work?

More Sniffing questions
132 questions (total)