Computer NetworksNETWORKS

CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days

The attack surface exposed by proprietary layer 2 protocols contains hidden bugs that have severe implications to the security of the devices that use them, …

source

mac address

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *