Exploiting a misconfiguration to direct traffic to a different VLAN without authorization.
VLAN hopping
Overflows the MAC table on a vulnerable switch so that it behaves like a hub, repeating frames out all ports.
Macof attack
A rogue wireless access point that attracts Wi-Fi clients to connect to the network.
Wifi Pineapple
Command-line tool used to poison responses to NetBIOS, LLMNR, and MDNS name resolution requests.
responder
A network-based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to the same network the hashed credentials originated on.
pass the hash (PtH)