Last Updated on August 7, 2021 by Admin 1
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
- He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
- He will activate OSPF on the spoofed root bridge.
- He will repeat this action so that it escalates to a DoS attack.
- He will repeat the same attack against all L2 switches of the network.