Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Sniffing and Spoofing with Kali Linux

Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.

Beginner
48m
(11)

Created by Alexander Tushinsky

Last Updated Feb 06, 2023

Course Thumbnail
  • Course

Sniffing and Spoofing with Kali Linux

Having access to an internal network can provide a wealth of information, if you know how to look for it. This course will teach you Sniffing and Spoofing techniques using Ettercap and TCPDump.

Beginner
48m
(11)

Created by Alexander Tushinsky

Last Updated Feb 06, 2023

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Once a foothold is established within a network, the next logical step is to try and capture the traffic of other systems to help gather intelligence. Having access to an internal network can provide a wealth of information, if you know how to look for it. In this course, Sniffing and Spoofing with Kali Linux, you’ll learn to use network packet inspection to your advantage. First, you’ll explore the ability to sniff and look at network traffic by using Ettercap and TCPDump to create a MAC flood attack. Next, you’ll discover how to perform an ARP poisoning attack, which establishes you as the “man-in-the-middle”, spying on traffic between a target PC and the router. Finally, you can implement a DNS spoofing attack, which ultimately can easily help you establish an additional foothold and provide you with a great deal of information about our target. When you’re finished with this course, you’ll have the skills and knowledge to work with Ettercap and TCPDump, tools needed to perform sniffing and spoofing attacks as part of a penetration test.

Sniffing and Spoofing with Kali Linux
Beginner
48m
(11)
Table of contents

About the author
Alexander Tushinsky - Pluralsight course - Sniffing and Spoofing with Kali Linux
Alexander Tushinsky
12 courses 4.7 author rating 170 ratings

Alex has spent the past 30 years working as a software developer, application architect, cybersecurity professional, and technical trainer. He is a lifelong learner and holds over 20 active certifications in software development, project management, and cybersecurity. Alex is a CompTIA and Microsoft Certified Trainer and enjoys sharing his knowledge with others. He has taught at Rutgers University (NJ), Bergen Community College (NJ), County College of Morris (NJ), College of Southern Nevada, and UNLV.

Get started with Pluralsight