- An attacker would launch an MAC Flood Attack to capture data from the network and to initiate a DoS attack.
- use the cmd #sh monitor session 1 detail to observe whether data is being sent in association with that session.
Thursday, January 27, 2011
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment