The Resource ARP spoofing and man in the middle attacks : execution and detection, Zaid Sabih

ARP spoofing and man in the middle attacks : execution and detection, Zaid Sabih

Label
ARP spoofing and man in the middle attacks : execution and detection
Title
ARP spoofing and man in the middle attacks
Title remainder
execution and detection
Statement of responsibility
Zaid Sabih
Title variation
Address Resolution Protocol spoofing and man in the middle attacks
Creator
Subject
Language
eng
Summary
"In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. This course focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack - all the attacks explained in this course are launched against real devices. All the attacks in this course are practical attacks that work against any device connected to your network, so it does not matter what kind of device you are targeting. Each attack is explained in a simple way first so that you understand how it actually works - first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux."--Resource description page
Cataloging source
UMI
Characteristic
videorecording
http://library.link/vocab/creatorName
Sabih, Zaid
LC call number
TK5105.59
http://bibfra.me/vocab/relation/on-screenpresenter
YkLBHRnXQc4
PerformerNote
Presenter, Zaid Sabih
Runtime
179
http://library.link/vocab/subjectName
  • Computer networks
  • Local area networks (Computer networks)
  • Penetration testing (Computer security)
  • Computer security
Technique
live action
Label
ARP spoofing and man in the middle attacks : execution and detection, Zaid Sabih
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9781789344677
Instantiates
Publication
Note
Title from resource description page (Safari, viewed May 17, 2018)
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type code
  • tdi
Content type MARC source
rdacontent
Control code
on1035957668
Dimensions
unknown
Extent
online resource (1 volume)
Form of item
online
Media category
  • computer
  • video
Media MARC source
  • rdamedia
  • rdamedia
Media type code
  • c
  • v
Medium for sound
other
Other physical details
illustrations.
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • remote
  • other
Stock number
CL0500000965
System control number
(OCoLC)1035957668
Video recording format
other
Label
ARP spoofing and man in the middle attacks : execution and detection, Zaid Sabih
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9781789344677
Publication
Note
Title from resource description page (Safari, viewed May 17, 2018)
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type code
  • tdi
Content type MARC source
rdacontent
Control code
on1035957668
Dimensions
unknown
Extent
online resource (1 volume)
Form of item
online
Media category
  • computer
  • video
Media MARC source
  • rdamedia
  • rdamedia
Media type code
  • c
  • v
Medium for sound
other
Other physical details
illustrations.
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • remote
  • other
Stock number
CL0500000965
System control number
(OCoLC)1035957668
Video recording format
other

Library Locations

    • Merrimack Valley Library ConsortiumBorrow it
      4 High Street, Suite 175, North Andover, MA, 01845, US
      42.7009413 -71.1255084
Processing Feedback ...