Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

How attackers use ip spoofing to attack computers or machines?

user-image
Question added by Dawit Terefe , PS/CS Core Network Expert Engineer , Ethiopia Telecom
Date Posted: 2016/06/03
Dawit Terefe
by Dawit Terefe , PS/CS Core Network Expert Engineer , Ethiopia Telecom

on layer 2   use man in the middle and by flooding the sender and the rceiving the fake ip 

More Questions Like This