How would an attacker use the following configuration settings?
A client based HIDS evasion attack
A firewall based DDoS attack
A router based MITM attack
A switch based VLAN hopping attack
Submit