February 2018
Intermediate to advanced
396 pages
9h 38m
English
During this attack, an attacker mimics a switch by emulating ISL or 802.1q and signaling with DTP. Thus, it looks like a switch with a trunking port, so it will have access to all the VLANs.