STP Design and Attacks


The project understands the design and architecture of the spanning tree protocol with a packet analysis of STP protocol with wireshark. The different types of attacks which are targetted on a network on which STP is deployed, mitigation techniques and

methods to simulate a STP attack with appropriate code is provided.

Report contents

1. STP Design
2. Understanding layer 2 loops
3. STP Architecture
4. STP Working
5. STP Packet analysis
6. STP Attack methodology
7. STP attack tools
8. STP attack mitigation
9. Lab environment for STP attack demonstration
10. Scapy code for simulating the attack.
11. References.

Report format: PPT

No of Slides: 26

Buy & Download the network security project bundle to get access to the report