CYBER SECURITY (Penetration Testing Prerequisites) 1.6
Link-layer Devices and protocols
In that article, we will dive into link layers devices and protocols, but before we start we have to know how does this support my career as a pentester :
MAC spoofing
Testing Switches security
sniffing techniques
man in the middle attack
And i...