pwncollege
DojosLeaderboardCommunity
Back to cse365-f2025

Module 7

cse365-f2025
0/34 challenges completed

In this seventh module we will learn about how networking protocols work at a low level, and abuse their weaknesses to intercept and manipulate network traffic.

Questions and Discussions (Discord)

  • Chat about the content: Core Material > #intro-to-cybersecurity
  • Create a forum post: Core Material > #core-material-forum

Intercepting Communication

Learn various techniques to intercept and manipulate network communication, from connecting to remote hosts to performing man-in-the-middle attacks.

1
LECTURE: Introduction
2
LECTURE: Ethernet
3
LECTURE: Internet Protocol (IP)
4
LECTURE: Transmission Control Protocol (TCP)
5
LECTURE: Address Resolution Protocol (ARP)
6
Connect
7
Send
8
Shutdown
9
Listen
10
Scan 1
11
Scan 2
12
Monitor 1
13
Monitor 2
14
Sniffing Cookies
15
Network Configuration
16
Firewall 1
17
Firewall 2
18
Firewall 3
19
Denial of Service 1
20
Denial of Service 2
21
Denial of Service 3
22
Ethernet
23
IP
24
TCP
25
TCP Handshake
26
UDP
27
UDP 2
28
UDP Spoofing 1
29
UDP Spoofing 2
30
UDP Spoofing 3
31
UDP Spoofing 4
32
ARP
33
Intercept
34
Man-in-the-Middle