By the end of this section, you will be able to:
● Understand the concept and impact of MAC flooding attacks on network switches.
● Execute a MAC flooding attack using appropriate tools in a controlled lab setup.
● Analyze the network behavior and consequences of the attack.
In this exercise, you will gain experience with:
● How MAC flooding can disrupt normal switch operations and lead to traffic leakage.
● Tools and techniques used to perform MAC flooding attacks (e.g., Yersinia, macof, or custom scripts).
● How to target the AS3 switch specifically and monitor its response.