An attacker can sometimes convince a switch to send information to places it normally wouldn’t. In this video, you’ll learn how MAC flooding can be used to turn a switch into a hub.
An attacker can sometimes convince a switch to send information to places it normally wouldn’t. In this video, you’ll learn how MAC flooding can be used to turn a switch into a hub.