1 00:00:00,230 --> 00:00:05,330 Hello and welcome to the network and Layer two attacks and Countermeasures course. 2 00:00:06,590 --> 00:00:09,980 Now, throughout the course, we're going to learn the following topics. 3 00:00:09,980 --> 00:00:14,540 First, we'll prepare the lab environment for hands on experiments. 4 00:00:14,570 --> 00:00:20,030 Second, we'll learn how to sniff the network and gather information from the network. 5 00:00:20,330 --> 00:00:24,020 We're going to use some tools such as Tcpdump and Wireshark. 6 00:00:24,050 --> 00:00:29,360 Then we'll see some attacks and techniques to expand the sniffing surface. 7 00:00:29,660 --> 00:00:37,400 Mac Address Table Overflow Attack, also known as Mac Flooding ARP Cache Poisoning Attack, also known 8 00:00:37,400 --> 00:00:39,200 as ARP Spoof. 9 00:00:40,150 --> 00:00:47,200 Dhcp starvation attack and Dhcp spoof and Vlan hopping techniques. 10 00:00:48,130 --> 00:00:55,720 The next topic is what else can be done on network devices in penetration tests, gathering information, 11 00:00:55,720 --> 00:01:00,100 cracking passwords of the communication channels, compromising SNMp. 12 00:01:00,130 --> 00:01:01,100 ET cetera. 13 00:01:01,510 --> 00:01:09,100 Finally, we'll check the configurations of the network devices, the password creation methods, identity 14 00:01:09,100 --> 00:01:13,690 management, access control lists, port security, and the list goes on. 15 00:01:13,930 --> 00:01:14,950 You with me?