1 00:00:00,360 --> 00:00:05,120 ‫Hello and welcome to the network and layer two attacks and countermeasures course. 2 00:00:06,790 --> 00:00:12,850 ‫Now, throughout the course, we're going to learn the following topics first will prepare the lab environment 3 00:00:12,850 --> 00:00:14,380 ‫for hands on experiments. 4 00:00:14,800 --> 00:00:19,780 ‫Second, we'll learn how to sniff the network and gather information from the network. 5 00:00:20,620 --> 00:00:24,010 ‫We're going to use some tools, such as TCPDUMP and Wireshark. 6 00:00:24,190 --> 00:00:29,140 ‫Then we'll see some attacks and techniques to expand the sniffing surface. 7 00:00:29,980 --> 00:00:37,480 ‫Mac address table overflow attack, also known as Mac flooding ARP cache poisoning attack, also known 8 00:00:37,480 --> 00:00:39,040 ‫as HRP spoof. 9 00:00:40,320 --> 00:00:47,010 ‫The starvation attack and DHP spoof and VLAN hopping techniques. 10 00:00:48,340 --> 00:00:55,750 ‫The next topic is what else can be done on network devices in penetration tests, gathering information, 11 00:00:55,750 --> 00:01:03,460 ‫cracking passwords of the communication channels, compromising as an MP, etc. and finally will check 12 00:01:03,460 --> 00:01:10,480 ‫the configurations of the network devices, the password creation methods, identity management, access 13 00:01:10,480 --> 00:01:13,510 ‫control lists, port security and the list goes on. 14 00:01:14,200 --> 00:01:14,800 ‫You with me?