pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to intro-to-cybersecurity

Intercepting Communication

intro-to-cybersecurity
0/29 challenges completed

Learn various techniques to intercept and manipulate network communication, from connecting to remote hosts to performing man-in-the-middle attacks.

Intercepting Communication: Introduction
Video
Slides
Intercepting Communication: Ethernet
Video
Slides
Intercepting Communication: Internet Protocol
Video
Slides
Intercepting Communication: Transmission Control Protocol
Video
Slides
Intercepting Communication: Address Resolution Protocol
Video
Slides
Getting Started Notes
Tooling Documentation

Challenges

1
Connect
2
Send
3
Shutdown
4
Listen
5
Scan 1
6
Scan 2
7
Monitor 1
8
Monitor 2
9
Sniffing Cookies
10
Network Configuration
11
Firewall 1
12
Firewall 2
13
Firewall 3
14
Denial of Service 1
15
Denial of Service 2
16
Denial of Service 3
17
Ethernet
18
IP
19
TCP
20
TCP Handshake
21
UDP
22
UDP 2
23
UDP Spoofing 1
24
UDP Spoofing 2
25
UDP Spoofing 3
26
UDP Spoofing 4
27
ARP
28
Intercept
29
Man-in-the-Middle