I know exactly how, but i cant tell you. I worked in the telecommunication network infrastructure field. Think L2 instead of L3 network wise. That is how they would do it.
You mean there is an exploitable vulnerability at layer 2 of the OSI model that could cause a MAC address routing failure that would basically disrupt the flow of data packets?
I know exactly how, but i cant tell you. I worked in the telecommunication network infrastructure field. Think L2 instead of L3 network wise. That is how they would do it.
You mean there is an exploitable vulnerability at layer 2 of the OSI model that could cause a MAC address routing failure that would basically disrupt the flow of data packets?