- Lab
- Security

Network Protocols for Security: IPv4 and ARP
In this lab, you'll practice creating network traffic and inspecting Link and Internet layer protocols. When you're finished, you'll have a fundamental understanding on how to find anomalies within IPv4 and ARP.

Path Info
Table of Contents
-
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
-
Challenge
MAC Addressing
In this challenge you will be analyzing media access control (MAC) addresses and learning how they can be spoofed within a network.
-
Challenge
Address Resolution Protocol (ARP)
This challenge will have you exploring the Address Resolution Protocol (ARP), analyzing ARP broadcasts, and taking a look at an ARP storm.
-
Challenge
Exploring IPv4 in Malicious Traffic
With IPv4, you will detect anomalies by inspecting the Time to Live (TTL) field within the IP header. This challenge makes use of a Man in the Middle (MiTM) attack.
-
Challenge
The Final Challenge
The last challenge of this lab and your last chance to experience the environment before clicking Next and ending this small little world that flittered into existence just for you.
What's a lab?
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.