Attack 4: Simulating a Dual-Homed Switch
Yersinia can booty advantage of computers able with two Ethernet cards to masquerade
as a dual-homed switch. This adequacy introduces an absorbing traffic-redirection attack,
as Figure 3-7 shows.
64 Chapter 3: Attacking the Spanning Tree Protocol
Figure 3-7 Simulating a Dual-Homed Switch
In Figure 3-7, a hacker connects to switches 1 and 4. It again takes basis ownership, creating
a new cartography that armament all cartage to cantankerous it. The burglar could alike force switches 1
and 4 to accommodate the conception of a block anchorage and ambush cartage for added than one VLAN.
Again, BPDU-guard stands out as the best advantageous band-aid to avert the attack.