Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
eli117
Highly Voted 1 year agodesertlotus1211
Most Recent 2 weeks, 6 days ago[Removed]
4 months, 2 weeks agoinsaniunt
5 months agosringan
6 months, 3 weeks agoYonGCybeR
5 months, 3 weeks agojeremy13
1 year ago