Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
eli117
Highly Voted 1 year, 6 months agoMann098
Most Recent 3 months agodesertlotus1211
5 months, 3 weeks agoinsaniunt
10 months, 1 week agosringan
11 months, 3 weeks agoYonGCybeR
11 months agojeremy13
1 year, 5 months ago