Security analysts are conducting an investigation of an attack that occurred inside the organization's network. An attacker was able to collect network traffic between workstations throughout the network. The analysts review the following logs:
The Layer 2 address table has hundreds of entries similar to the ones above. Which of the following attacks has MOST likely occurred?
rodwave
Highly Voted 2 years, 6 months agoMumbo
Highly Voted 1 year, 6 months agoKheeze1
1 year, 5 months agoPesos
1 year, 2 months agoslackbot
Most Recent 2 months agoProtract8593
1 year, 9 months agoYawannawanka
2 years agofouserd
2 years, 1 month agoRonWonkers
2 years, 7 months ago_Tyler_
2 years, 8 months agoScottT
2 years, 8 months agoYuyuyakuza
2 years, 8 months ago