He will activate OSPF on the spoofed root bridge.

He will repeat the same attack against all L2 switches of the network.

He will repeat this action so that it escalates to a DoS attack.

He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *