Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
eli117
Highly Voted 1 year, 9 months agoMann098
Most Recent 6 months agodesertlotus1211
8 months, 3 weeks agoinsaniunt
1 year, 1 month agosringan
1 year, 2 months agoYonGCybeR
1 year, 1 month agojeremy13
1 year, 8 months ago