Spanning Tree Protocol Attack By altering the network topology, Spanning Tree Protocol (STP) attacks aim to take advantage of flaws in the STP, which functions at the OSI Layer 2. The overall objective is to abuse STP behavior, usually by transmitting fake Bridge Protocol Data Units (BPDUs), to affect forwarding pathways, disrupt the network, or […]