By the end of this course, learners will be able to identify, execute, and defend against backdoor exploits, privilege escalation, spoofing, redirection, and denial-of-service attacks. They will analyze techniques using Meterpreter, command prompt, DNS spoofing, DHCP manipulation, ICMP redirection, and advanced DDoS strategies.



Ethical Hacking: Meterpreter, DNS & ICMP Attacks
This course is part of Kali Linux: Ethical Hacking & Pentesting Specialization

Instructor: EDUCBA
Access provided by SDNB College
What you'll learn
Identify and simulate backdoors, privilege escalation, and spoofing.
Apply tools like Meterpreter, John the Ripper, and EvilGrade.
Execute and defend against MITM, redirection, and DDoS attacks.
Skills you'll gain
Details to know

Add to your LinkedIn profile
12 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
This module explores the foundations of backdoor creation, privilege escalation, and exploitation techniques using Meterpreter, command prompt, and Trojan-based attacks. Learners will understand how attackers gain persistent access, bypass security restrictions, and deploy social engineering methods like malicious PDFs and Java applets.
What's included
11 videos4 assignments1 plugin
This module introduces students to advanced spoofing and redirection attacks, including ARP, DNS, DHCP, and ICMP manipulation. Learners will study how adversaries exploit trust in network protocols to reroute traffic, perform man-in-the-middle (MITM) attacks, and hijack communications to gain control.
What's included
11 videos4 assignments
This module covers denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, as well as supporting malicious tools. Students will learn how attackers disrupt services, exploit insecure update mechanisms with tools like EvilGrade, and practice defensive strategies to prevent DDoS on modern systems.
What's included
10 videos4 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Why people choose Coursera for their career









