Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
eli117
Highly Voted 1 year, 7 months agodesertlotus1211
Most Recent 7 months, 2 weeks agoinsaniunt
12 months agosringan
1 year, 1 month agoYonGCybeR
1 year agojeremy13
1 year, 7 months ago