Switch Attacks: MAC Flooding, ARP Spoofing & More
Learn about common switch-based attacks like MAC flooding, ARP spoofing, VLAN hopping, and how to protect your network. π

Cyberconnect
23.5K views β’ Oct 11, 2024

About this video
In this video, we break down the top switch-based attacks that threat actors use to exploit network infrastructures. If you manage or design networks, understanding these Layer 2 threats is crucial.
π What youβll learn:
MAC Flooding: How attackers overflow the switchβs CAM table to force traffic to broadcast.
ARP Spoofing: How fake ARP responses can poison a network and enable man-in-the-middle attacks.
VLAN Hopping: Techniques attackers use to jump across VLAN boundaries and access unauthorized segments.
MAC Spoofing & STP Manipulation: How impersonating devices and modifying spanning tree priorities can compromise your topology.
We also cover:
β How each attack works (visual breakdowns)
β Real-world use cases and what attackers are targeting
β Best practices to mitigate and defend against these threats
β Tools used to simulate or test these attacks for educational purposes
Whether you're studying for Network+, Security+ or just want to harden your network, this is must-know knowledge for defending the edge of your infrastructure.
π What youβll learn:
MAC Flooding: How attackers overflow the switchβs CAM table to force traffic to broadcast.
ARP Spoofing: How fake ARP responses can poison a network and enable man-in-the-middle attacks.
VLAN Hopping: Techniques attackers use to jump across VLAN boundaries and access unauthorized segments.
MAC Spoofing & STP Manipulation: How impersonating devices and modifying spanning tree priorities can compromise your topology.
We also cover:
β How each attack works (visual breakdowns)
β Real-world use cases and what attackers are targeting
β Best practices to mitigate and defend against these threats
β Tools used to simulate or test these attacks for educational purposes
Whether you're studying for Network+, Security+ or just want to harden your network, this is must-know knowledge for defending the edge of your infrastructure.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
23.5K
Likes
1.1K
Duration
10:24
Published
Oct 11, 2024
User Reviews
4.6
(4) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now