Understanding Network Attacks, Cyber Threat Intelligence (CTI)
MAC flooding involves the flooding of the CAM table with fake MAC address and IP pairs until it is full.
The Switch then acts as a hub by broadcasting packets to all machines on the network, and therefore, the attackers can sniff the traffic easily.
...
bentil.hashnode.dev2 min read