An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

Last Updated on August 7, 2021 by Admin 1

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

  • He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
  • He will activate OSPF on the spoofed root bridge.
  • He will repeat this action so that it escalates to a DoS attack.
  • He will repeat the same attack against all L2 switches of the network.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments