A framework for layer 2 attacks.
It is capable of many diverse attacks over multiple protocols, such as becoming the root role in the Spanning Tree (Spanning Tree Protocol), creating virtual CDP (Cisco Discovery Protocol) neighbors, becoming the active router in a HSRP (Hot Standby Router Protocol) scenario, faking DHCP replies, and other low-level attacks.
# 1: DOS attack sending conf BPDUs
# 2: DOS attack sending tcn BPDUs
# 3: NONDOS attack Claiming Root Role
# 4 NONDOS attack Claiming a non-root role
# 5 DOS attack causing eternal root elections
# 6 DOS Attack causing root dissapearance