CDP Hijacking attack
The attacker intercepts CDP packets and modifies them to redirect traffic to a different destination. This could allow the attacker to steal sensitive information or execute man-in-the-middle attacks.
Last updated
The attacker intercepts CDP packets and modifies them to redirect traffic to a different destination. This could allow the attacker to steal sensitive information or execute man-in-the-middle attacks.
Last updated