Layer 2 Attacks CDP and LLDP reconnaissance VTY Lines Attacks MAC based attacks: Mac flooding/CAM table overflow Spoofing attacks (ARP, DHCP, Server …) STP attacks VLAN hopping: Switch spoofing / 802.1q Double tagging Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512 hashesTop Ethical Hacker ForumsIntroduction to Ethical Hacking (EH)Ethical Hacking Online CoursesPenetration Testing Labs to Improve Your Penetration SkillHow to Prepare for CEH, LPT Master and OSCP ExamLayer 3 Attacks