1.Post any new or the latest hacking techniques not discussed in the book and if you choose not to please review and post comments on one or more the hacking techniques below:
VLAN Hopping
ARP Poisoning
MAC Spoofing
Dynamic Host Resolution Protocol (DHCP) – Man-in-the-Middle (MITM) attack
BEAST (Browser Exploit Against SSL/TLS)
2. Compare and contrast Asymmetric Key Algorithm’s: RSA, Diffie-Hellman, and Elliptic Curve vs Symmetric Key Algorithms: Triple DES, Twofish, RC(6), and AES then please discuss what is your personal preferred method of encryption and why?
3. Research and post only one VPN type or protocols such as OpenVPN,PPTP,IPSEC,SSL,MPPE,L2TP, and Ikev2 and please post your favorite VPN product or type and if you have not used one then please research a VPN product and post the product of your preference.