Network Security: Tracking Bad Actors Through Layer 2 Switch Environment

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • In this video, we will demonstrate how to track devices through a layer 2 switch environment. We will demonstrate how to use ARP to correlate the IP address with a MAC address. We will then use CDP to help us find the next switch in the path of traffic.
    ---------------------------------------------------
    Microphone : Blue Yeti (www.bluemic.co...)
    Cisco Packet Tracer (www.netacad.co...)
    Screen Capture Software : Screen-O-Matic (screencast-o-m...)
    Photo Editor : Adobe Photoshop (www.adobe.com)
    Video Editor : Adobe Premiere Pro (www.adobe.com)
    Graphics Creation : Adobe After Effects (www.adobe.com)

Комментарии •