Network Security: Tracking Bad Actors Through Layer 2 Switch Environment

Sdílet
Vložit
  • čas přidán 22. 02. 2022
  • In this video, we will demonstrate how to track devices through a layer 2 switch environment. We will demonstrate how to use ARP to correlate the IP address with a MAC address. We will then use CDP to help us find the next switch in the path of traffic.
    ---------------------------------------------------
    Microphone : Blue Yeti (www.bluemic.com/en-us/product...)
    Cisco Packet Tracer (www.netacad.com/courses/packe...)
    Screen Capture Software : Screen-O-Matic (screencast-o-matic.com)
    Photo Editor : Adobe Photoshop (www.adobe.com)
    Video Editor : Adobe Premiere Pro (www.adobe.com)
    Graphics Creation : Adobe After Effects (www.adobe.com)

Komentáře •