Which of the following is a technique used to attack an Ethernet wired or wireless network?