This chapter was a useful explanation of how to compromise networks by exploiting layer 2 weaknesses. The next chapter will be an in-depth learning experience that explains how to exploit Voice over IP systems.





















































This chapter was a useful explanation of how to compromise networks by exploiting layer 2 weaknesses. The next chapter will be an in-depth learning experience that explains how to exploit Voice over IP systems.