Course Content

Course Content


Eavesdropping is described as listening in secret to another person's private discussion. Listening to your neighbours' fight through a vent in your apartment is an example of eavesdropping. Wiretapping or intercepting e-mail or cell phone calls can be used to get access to private electronic communications.

When it comes to cyber security, eavesdropping, also known as sniffing or snooping, is a serious worry. Passwords, credit card numbers, and other sensitive data can easily stolen while being moved from one device to another as a result of these assaults.

A man-in-the-middle (MitM) attack is the most common active eavesdropping assault. Malware or spoofing attacks, such as Address Resolution Protocol, DNS, Dynamic Host Configuration Protocol, IP or MAC address spoofing, are used to penetrate systems in MitM attacks.

Passive attacks can be divided into two categories: - eavesdropping (tapping): the attacker merely listens in on two entities' communications. The traffic must not be encrypted for the attack to be effective.

Passive eavesdropping and aggressive eavesdropping are the two forms of eavesdropping attacks. The hacker just "listens" to data travelling via the network with passive eavesdropping. Hackers use active eavesdropping to hide their identities.

Recommended Courses

Share With Friend

Have a friend to whom you would want to share this course?

Download LearnVern App

App Preview Image
App QR Code Image
Code Scan or Download the app
Google Play Store
Apple App Store
598K+ Downloads
App Download Section Circle 1
4.57 Avg. Ratings
App Download Section Circle 2
15K+ Reviews
App Download Section Circle 3
  • Learn anywhere on the go
  • Get regular updates about your enrolled or new courses
  • Share content with your friends
  • Evaluate your progress through practice tests
  • No internet connection needed
  • Enroll for the webinar and join at the time of the webinar from anywhere