Layer 2 Attacks
VLAN Hopping
ARP Cache Poisoning
Switch Architecture Weaknesses
Layer 3 Attacks
IP Redirections
Session Hijacking
Session Replay
Network / OS Layer Attacks
Network Hash Passing
DHCP and DNS Weaknesses
Various OS Weaknesses
Advanced Attacks
Protocol Fuzzing
Cryptographic Weaknesses
Buffer Overflow
Zero-day