Download now Free registration required
Data Link layer is considered as the weakest link in a secured network. If an initial attack comes in at Layer 2, the whole network can be compromised. To illustrate the weakness of Layer 2 networks, attacking tools for this layer are surveyed and discussed in this paper. The main functions of these tools and how they can be used to launch attacks are discussed. Although the authors of this paper strongly against malicious attacks to networks, it is the belief that the best way to protect a network is to know how it can be attacked. The tools listed out in this paper can therefore be used for carrying out attacks as part of testing and learning.
- Format: PDF
- Size: 1048.3 KB