This is a dedicated watch page for a single video.
Alex, a skilled hacker, focused on infiltrating an organization's network to intercept all traffic. In the process, Alex inserted a rogue switch into an unutilized LAN port, assigning it a lower priority than any other switch in the network. The objective was to designate it as a root bridge, facilitating the subsequent interception of all network traffic. What type of attack did Alex perform in the described scenario?