Exploiting the Network Vulnerabilities
Welcome to the Exploiting the Network Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Exploiting the Network Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 - Exploiting the Network Vulnerabilities
After completing this lab, you will be able to:
- Perform a Slowloris Attack on a Website
- Conduct an Address Resolution Protocol (ARP) Poisoning Attack
- Conduct Man-In-The-Middle Attacks using Ettercap
- Track the Sniffing Network Interface Cards (NICs) on the Network
- Perform DNS Spoofing Attack
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 3.2 Given a scenario, exploit network-based vulnerabilities
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1- Exploiting the Network Vulnerabilities
Penetration Testing, or Pentest, is a simulated cyber attack to exploit the vulnerabilities in a network and the systems. It locates the vulnerabilities and then attempts to exploit them. A person conducting the pentest can attempt a breach of applications, protocols, Application Programming Interfaces (APIs), servers, firewalls, and anything that can be exploited on a network. The core intent is to discover the vulnerabilities before an attacker from the outside world can and then exploit them to simulate the amount of damage that can be caused.
In this exercise, you will learn about Penetration Testing and its importance.
Learning Outcomes
After completing this exercise, you will be able to:
- Perform a Slowloris Attack on a Website
- Conduct an Address Resolution Protocol (ARP) Poisoning Attack
- Conduct Man-In-The-Middle Attacks Using Ettercap
- Track the Sniffing Network Interface Cards (NICs) on the Network
- Perform DNS Spoofing Attack
See the full benefits of our immersive learning experience with interactive courses and guided career paths.