what is footprinting in ethical hacking?what is the techniques used for footprinting?
Explain what is network sniffing?
Explain what is ARP spoofing or ARP poisoning?
How you can avoid or prevent ARP poisoning?
What is macc flooding?
Explain what is DHCP Rogue server?