Detailed analysis of security vulnerabilities
A system is operating in "promiscuous" mode which allows it to perform packet sniffing.