This is the second part of Layer 2 Security. We already posted Part 1, if you have not checked that then please check it out first as skipping the first part may lead you to leave the vulnerability in your network. We have already covered MAC attacks and VLAN Hopping attacks. The remaining Layer-2 attacks […]