MAC Flooding is an attack in which attackers overflow the MAC address table of a switch and use that to steal sensitive data from hosts connected to the switch. Attackers can also use MAC Flooding to perpetrate a Man-In-The-Middle attack by link the MAC address of a malicious device with the IP address of a legitimate host.
How does MAC Flooding work and how can we prevent it? In this article, we would discuss that in detail.
0 Comments