Answer Posted / chaitanya
Mac Flooding is a technique where the security of given network switch is compromised. In Mac flooding the hacker or attacker floods the switch with large number of frames, then what a switch can handle. This make switch behaving as a hub and transmits all packets at all the ports. Taking the advantage of this the attacker will try to send his packet inside the network to steal the sensitive information.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What os do hackers use?
What laptops hackers use?
What is footprinting in ethical hacking? What is the techniques used for footprinting?
How do hackers hack passwords?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What laptops do hackers use?
What software do hackers use?
What are the 3 types of hackers?
Who is the best hacker in the world?
Who is the most dangerous hacker?
What tools do real hackers use?