Layer 2 Attacks – MAC Address Spoofing Attacks
Unlike hubs, switches regulate the flow of data between ports by creating instant networks that contain only the two endpoint devices communicating with each other at that moment in time. Switch…
http://www.ebrahma.com/2015/04/layer-2-attacks-mac-address-spoofing-attacks/

Advertisements