J
J
jane jane2013-12-05 13:50:13
Computer networks
jane jane, 2013-12-05 13:50:13

What network attacks are possible at the data link layer (OSI). In which direction is it better to start digging?

maybe there are resources other than Tanenbaum and Oliferov? =\
I somehow need it more purposefully.
It seems that I got the most boring topic =\

Answer the question

In order to leave comments, you need to log in

2 answer(s)
H
hornet_ru, 2013-12-05
@ru_janex

Not boring at all: ARP spoofing, MAC spoofing, MITM, etc. You can implement something like this .

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question