Stp Гєtoky.pptx — Arp A
: Attackers send falsified ARP messages to a local network to link their MAC address with the IP address of a legitimate server or gateway. This allows them to intercept, modify, or stop data in transit, often facilitating Man-in-the-Middle (MitM) attacks.
: Prevents a port from becoming a root port, ensuring the Root Bridge remains on a trusted core switch. ARP a STP Гєtoky.pptx
: In an STP attack, a malicious actor sends Bridge Protocol Data Units (BPDUs) with a higher priority (lower numerical value) to force the network to elect their device as the "Root Bridge". This causes all network traffic to flow through the attacker's device for interception. : Attackers send falsified ARP messages to a