Exploiting the Network Vulnerabilities

Practice Labs Module
Time
57 minutes
Difficulty
Intermediate

Welcome to the Exploiting the Network Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Overview

Introduction

Welcome to the Exploiting the Network Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Exploiting the Network Vulnerabilities

After completing this lab, you will be able to:

  • Perform a Slowloris Attack on a Website
  • Conduct an Address Resolution Protocol (ARP) Poisoning Attack
  • Conduct Man-In-The-Middle Attacks using Ettercap
  • Track the Sniffing Network Interface Cards (NICs) on the Network
  • Perform DNS Spoofing Attack

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 3.2 Given a scenario, exploit network-based vulnerabilities

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1- Exploiting the Network Vulnerabilities

Penetration Testing, or Pentest, is a simulated cyber attack to exploit the vulnerabilities in a network and the systems. It locates the vulnerabilities and then attempts to exploit them. A person conducting the pentest can attempt a breach of applications, protocols, Application Programming Interfaces (APIs), servers, firewalls, and anything that can be exploited on a network. The core intent is to discover the vulnerabilities before an attacker from the outside world can and then exploit them to simulate the amount of damage that can be caused.

In this exercise, you will learn about Penetration Testing and its importance.

Learning Outcomes

After completing this exercise, you will be able to:

  • Perform a Slowloris Attack on a Website
  • Conduct an Address Resolution Protocol (ARP) Poisoning Attack
  • Conduct Man-In-The-Middle Attacks Using Ettercap
  • Track the Sniffing Network Interface Cards (NICs) on the Network
  • Perform DNS Spoofing Attack
Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.