DAI is now part of the CCNA 200-301 exam. You need to know both DAI and DHCP Snooping for the new CCNA exam. Kali Linux can be used to implement an ARP poisoning attack which can result in a man-in-the-middle attack to capture passwords. Stop ARP poisoning attacks by implement Dynamic ARP Inspection.

In a previous video I demonstrated how to use Ettercap and Kali Linux to capture usernames and passwords by poisoning the ARP caches of a Windows 10 computer and Cisco router. In this video I’ll show you how to stop this type of attack.

ARP spoofing attacks and ARP cache poisoning can occur because ARP allows a gratuitous reply from a host even if an ARP request was not received. After the attack, all traffic from the device under attack flows through the attacker’s computer and then to the router, switch, or host.

An ARP spoofing attack can target hosts, switches, and routers connected to your Layer 2 network by poisoning the ARP caches of systems connected to the subnet and by intercepting traffic intended for other hosts on the subnet.

It’s so easy to hack badly configured networks using Kali Linux! Ethernet networks rely on protocols such as Address Resolution Protocol (ARP) to function, but they can be easily manipulated using Kali Linux. Make sure you have configured your networks securely! Otherwise, look at how simple it is to hack networks using Kali Linux running on a Windows 10 computer. Applications like Ettercap make hacking with Kali Linux super easy! It’s important that you as a network professional know how to protect networks from hackers. Even the new Cisco CCNA 200-301 exam covers some of these hacking topics. Don’t just learn the theory of hacking, learn how to hack practically.

In this Ethical Hacking with Kali Linux playlist, I’m going to show you step by step how to hack and protect networks. This is white-hat hacking, not black-hat – in other words this is about teaching you Ethical hacking to help you better secure your networks!

In this video I’ll show you how to poison the ARP cache of a Windows 10 computer and then implement a Man in the middle (MITM) attack so you can see all data sent between the Windows 10 computer and it’s default gateway. In subsequent videos I’ll show you how to hack other protocols.

======================
Menu:
======================
Overview: 0:00
Enable DHCP Snooping: 4:33
Enable and verify DAI: 9:30

======================
Cheatsheet PDF:
======================
Dynamic ARP Inspection: http://bit.ly/dynamicarp

======================
Previous Video:
======================
Kali Linux: Hacking ARP: https://youtu.be/ns7TYxNcYBM

======================
CCNA content:
======================
Free CCNA content: https://www.youtube.com/playlist?list=PLhfrWIlLOoKM3niunUBTLjOR4gMt_uR_a

CCNA course: http://bit.ly/2PmTVPD

=================================
Free and Trial Network Software:
=================================
Solar-PuTTY: http://bit.ly/SolarPutty
SolarWinds TFTP Server: http://bit.ly/2mbtD6j
WAN Killer: http://bit.ly/wankiller
Engineers Toolset: http://bit.ly/gns3toolset
IP Address Scanner: http://bit.ly/swipscan
Network Device Scanner: http://bit.ly/swnetscan
Wifi Heat Map: http://bit.ly/wifiheat
Wifi Analyzer: http://bit.ly/swwifianalyzer
SolarWinds NPM: http://bit.ly/getnpm

kali linux
Hacking
Ethical hacking
CompTIA Linux+
CompTIA Security+
CompTIA Network+

EVE-NG
GNS3
VIRL
Packet Tracer
CCNA
Cisco Devnet Associate

CCNP Enterprise
CCNP Security
CCNP Data Center
CCNP Service Provider
CCNP Collaboration
Cisco Certified Devnet Professional
Cisco Certified Network Professional

LPIC 1
LPIC 2
Linux Professional Institute
LX0-103
LX0-104
XK0-004

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#kalilinux/”>kalilinux #ccna #kali